Defensive Cyber Operations/Blue Teaming

  • Overview
  • Course Content
  • Requirements & Materials
Overview

Defensive Cyber Operations/Blue Teaming

Course Description

This lab-based course will introduce you to modern defensive skills required to counteract cyber threats. You will use live equipment and virtual machines representing “blue forces” tasked to negate real-world threats against systems and networks. Instructors will place particular emphasis on modeling current attack chains and the various techniques used to detect their tell-tale signatures.

Course Content

INTRODUCTION TO DEFENSIVE CYBER OPERATIONS/BLUE TEAMING

DEFENSIVE CYBER OPERATIONS TOOLS/CAPABILITIES

  • Prevention/detection tools
  • Response/forensic tools

MAPPING ATTACKS TO DEFENSIVE CAPABILITIES

THREE TIERS OF CAPABILITY/VISIBILITY

  • Perimeter monitoring
  • Internal network monitoring
  • Endpoint monitoring

DEFENSIVE CYBER OPERATIONS LAB

  • Post-compromise assessment
Requirements & Materials
Prerequisites
Materials

Provided

  • Laptop for use during class
  • Notebook

Who Should Attend

This course is designed for information security personnel tasked with the defense of critical systems, networks, and infrastructure; system administrators and advanced programmers; web developers; and database administrators.

What You Will Learn

  • Defensive cyber operations tools/capabilities
  • How to map attacks to defensive capabilities
  • Perimeter monitoring
  • Internal network monitoring
  • Endpoint monitoring
Woman working on cybersecurity project on computer

How You Will Benefit

  • Gain understanding of prevention/detection and response/forensic tools.
  • Develop the ability to identify Indicators of Compromise (IOCs) and Tactics, Techniques, and Procedures (TTPs).
  • Map defensive technology capabilities.
  • Determine effective remediation strategies.
  • Learn about the three tiers of capability/visibility: perimeter monitoring, internal network monitoring, and endpoint monitoring.
  • Explore hands-on labs that utilize firewalls, intrusion detection systems, and a malware sandbox.
  • Taught by Experts in the Field icon
    Taught by Experts in the Field
  • Grow Your Professional Network icon
    Grow Your Professional Network

The course schedule was well-structured with a mix of lectures, class discussions, and hands-on exercises led by knowledgeable and engaging instructors.

- Abe Kani
President

TRAIN AT YOUR LOCATION

We enable employers to provide specialized, on-location training on their own timetables. Our world-renowned experts can create unique content that meets your employees' specific needs. We also have the ability to deliver courses via web conferencing or on-demand online videos. For 15 or more students, it is more cost-effective for us to come to you.

  • Save Money
  • Flexible Schedule
  • Group Training
  • Customize Content
  • On-Site Training
  • Earn a Certificate
Learn More

Want to learn more about this course?