Blue Team Level 1 Junior Security Operations Certification Course & Guides
$5.00
Price: 5 USD | Size: 1.76 GB | Duration : 10+ Hours |50+ Lessons | ⭐️⭐️⭐️⭐️⭐️ 4.8
BRAND : Expert TRAINING | ENGLISH | Bonus : (ISC)² Blue Team PDF Guides | INSTANT DOWNLOAD
Description
Price: 5 USD | Size: 1.76 GB | Duration : 10+ Hours |50+ Lessons | ⭐️⭐️⭐️⭐️⭐️ 4.8
BRAND : Expert TRAINING | ENGLISH | Bonus : (ISC)² Blue Team PDF Guides | INSTANT DOWNLOAD
Blue Team Level 1 Junior Security Operations Certification Course & Guides
COURSE OVERVIEW
WHO IS THE COURSE FOR?
BTL1 is designed to train technical defenders that are capable of defending networks and responding to cyber incidents. Below are some examples of the skills and experience you will gain.
Analysing and responding to phishing attacks
Performing forensics investigations to collect and analyse digital evidence
Using a SIEM platform to investigate malicious activity
Log and network traffic analysis including malware infections
Conducting threat actor research
and much more!
The skills and tools you’ll learn in this course will be directly applicable to a range of security roles, and are actively used by defenders around the world.
WHY CHOOSE BTL1?
BTL1 is perfect for security enthusiasts or professionals that want to develop their practical defensive cyber skills. Roles that we believe would benefit from this course include:
Students/IT Personnel
Security Analysts
Incident Responders
Threat Intelligence Analysts
Forensics Analysts
Whilst our content is aimed primarily at entry-level or junior roles, read our course syllabus to see if BTL1 is the right choice for you or your team!
BTL1 meets 60% of the 125 requirements under the NICE Cyber Defense Analyst framework, including 67% of knowledge and 67% of ability.
Domain 1 – Security Fundamentals
This domain is designed to build the foundations for the rest of the course. Covering areas such as management principles, networking and soft skills, this domain will ensure you have the fundamental knowledge which you’ll build on throughout BTL1.
Introduction to Security Fundamentals
Soft Skills
Security Controls
Networking 101
Management Principles
Domain 2 – Phishing Analysis
We all know phishing is bad – but trust us, it’s really bad. By the end of this domain you’ll be able to confidently identify, analyze, and write reports on phishing emails, including any malicious URLs or attachments.
Introduction to Emails and Phishing
Types of Phishing Emails
Tactics and Techniques Used
Analysing URLs, Attachments, and Artifacts
Taking Defensive Measures
Report Writing
Lessons Learned
Phishing Response Challeng
Only logged in customers who have purchased this product may leave a review.
Reviews
There are no reviews yet.