C)CSA: Certified Cyber Security Analyst

Our Certified Cyber Security Analyst course helps you prepare an organization to create a complete end to end solution for proactively monitoring, preventing, detecting, and mitigating threats as they arise in real time. Do not fool yourself, this course is far more advanced than you may expect. It is fast paced and thorough, so you can enjoy a well-rounded experience. Be ready to dig deep into the details of security analysis for today’s needs. When we are done you will be able to setup and deploy state of the art open source and for purchase analysis tools, intrusion detection tools, syslog servers, SIEMs, along with integrating them for the entire company to find and an many cases prevent today’s exploits. *This course maps to the mile2 Certified Cyber Security Analyst Exam as well as the CompTIA CySA+CS0-001 certification exam.

Retail Price: $3,500.00

Next Date: 10/21/2024

Course Days: 5


Enroll in Next Date

Request Custom Course


Upon Completion

Upon completion, the Certified Cyber Security Analyst candidate will not only be able to competently take the C)CSA exam they will also be ready to prepare an organization for proactive defense against today’s hackers.

 

Who Should Attend

  • Security Professionals
  • Incident Handling Professionals
  • Anyone in a Security Operations Center
  • Forensics Experts
  • Cybersecurity Analysts

 

Prerequisites:

(Any of the following Mile2 Courses)

  • Certified Security Principles
  • Certified Digital Forensics Examiner
  • Certified Incident Handling Engineer
  • Certified Professional Ethical Hacker
  • Certified Penetration Testing Engineer
  • or equivalent knowledge

 


Outline:


Course Introduction
Chapter 1 - Blue Team Principles

a. Network Architecture and how it lays the groundwork
i. Defensive Network
b. Security Data Locations and how they tie together
c. Security Operations Center
i. The People, Processes, and Technology
ii. Triage and Analysis
iii. Digital Forensics
iv. Incident Handling
v. Vulnerability Management
d. Automation, Improvement, and Tuning

Chapter 1 Labs – Blue Team Principles
a. Analyze Initial Compromise Vector
b. Network Forensics
c. System Forensics

Chapter 2 - Digital Forensics
a. Investigative Theory and Processes
i. Digital Acquisition
ii. Evidence Protocols
iii. Evidence Presentation
b. Computer Forensics Laboratory
i. Protocols
ii. Processing Techniques
iii. Specialized Artifacts
c. Advanced Forensics for Today’s Exploitations

Chapter 2 Labs – Digital Forensics
a. Analysis of Captured Network Activity
b. Analysis of Captured Zip File

Chapter 3 - Malware Analysis
a. Creating the Safe Environment
b. Static Analysis
c. Dynamic Analysis
d. Behavior Based Analysis
e. What is different about Ransomware?
f. Manual Code Reversing

Chapter 3 Labs – Malware Analysis
a. Analysis of an MSFVenom Executable
b. Analysis of Locky Ransomware
c. Creating YARA Rules based on Analysis Results
d. Final Assessment

Chapter 4 - Traffic Analysis
a. Manual Analysis Principles
b. Automated Analysis Principles
i. Signatures compared to Behaviors
c. Application Protocols Analysis Principles
d. Networking Forensics

Chapter 4 Labs – Traffic Analysis
a. Traffic Analysis of a Website Defacement Attack
b. Traffic Analysis Based on IDS Alerts
c. Traffic Analysis of a ZLoader Delivery Attempt
d. Bonus: Find the Backdoor!!!

Chapter 5 - Assessing the Current State of Defense with the Organization
a. Network Architecture and Monitoring
b. Endpoint Architecture and Monitoring
c. Automation, Improvement, and continuous monitoring

Chapter 5 Labs – Assessing the Current State of Defense within the Organization
a. Configuring a Firewall
b. Configuring SIEM
c. Configuring IPDS
d. Upgrading Detection/Protection Capabilities

Chapter 6 - Leveraging SIEM for Advanced Analytics
a. Architectural Benefits
b. Profiling and Baselining
c. Advanced Analytics

Chapter 6 Labs – Leveraging SIEM for Advanced Analytics
a. Deploying Agent
b. Implementing User Behavior Analytics through Machine Learning
c. Simulate an Attack and Analyze Alerts

Chapter 7 - Defeating the Red Team with Purple Team tactics
a. Penetration Testing with full knowledge
i. Reconnaissance
ii. Scanning
iii. Enumeration
iv. Exploitation
v. Lateral Movement

Lab 1 – Establishing Ips and Logging into the VMs
Lab 2 – Blue Team Principles
Lab 3 – Digital Forensics
Lab 4 – Malware Analysis
Lab 5 – Traffic Analysis
Lab 6– Assessing the Current State of Defense within an Organization

Lab 7 – Leveraging SIEM for Advanced Analytics
Lab 8 – Defeating the Red Team with Purple Team Tactics

Labs are performed in Mile2's exclusive Cyber Range

 

Course Dates Course Times (EST) Delivery Mode GTR
10/21/2024 - 10/25/2024 9:00 AM - 5:00 PM Virtual Enroll