Especialista en equipo azul
Descripción general
El itinerario de Ciberdefensa pretende dar una amplia introducción a las diferentes áreas necesarias para detectar y responder a las amenazas. Este camino se centrará en las siguientes áreas:
-
Empezando
-
Gestión de amenazas y vulnerabilidades
-
Operaciones de Seguridad y Monitoreo
-
Emulación de amenazas
-
Respuesta a incidentes y análisis forense
-
Análisis de Malware e Ingeniería Inversa
Una vez que complete este camino, debe tener los componentes fundamentales para detectar y responder a las amenazas en un entorno corporativo y utilizar estos conceptos básicos para desarrollar su comprensión de temas más complejos dentro de este campo.
Nota: Esta ruta aún está en desarrollo y se agregarán más habitaciones a medida que estén disponibles.
Seleccione su(s) módulo(s)
Puede seleccionar los módulos que desea aprender. Hay un orden específico en la curva de aprendizaje por alguna razón obvia, a menos que ya sepas algo y quieras ir más allá.
Module 1 - Information Security Governance
Lesson 1: Enterprise Governance, 120min of course
1.1 Information and Cybersecurity Fundamentals
1.2 Information Security Governance
1.3 Governance Roles and Responsibilities
1.4 Governance Documents
1.5 Regulatory and Compliance Requirements
Lesson 2: Information Security Strategy, 100min of course
2.1 Strategy Development
2.2 Information Security Governance Frameworks
2.3 Building a Business Case
2.4 Metrics and Indicators
2.5 Audit and Assurance
Module 2 - Information Security Risk Management
Lesson 3: Risk Landscape, 80min of course
3.1 Risk Concept
3.2 Vulnerability Identification
3.3 Penetration Testing
3.4 Threat Actors and Attributes
3.5 Threat Modeling
Lesson 4: Risk Management, 80min of course
4.1 Risk Governance
4.2 Risk Assessment
4.3 Risk Analysis
4.4 Risk Response
4.5 Risk Monitoring
Module 3 - Information Security Program Development and Management
Lesson 5: Information Security Program Development, 80min of course
5.1 InfoSec Program Ecosystem
5.2 Information Security Frameworks and Benchmarks
5.3 Information Security Metrics
5.4 SETA Principles and Practices
5.5 Risk Monitoring
Lesson 6: Information Security Program Management, 130min of course
6.1 Asset Classification
6.2 Controls and Countermeasures
6.3 Control Baselines
6.4 Configuration Management
6.5 Change Control
6.6 Vulnerability and Patch Management
6.7 SDLC and Collaboration
6.8 Cloud Computing
6.9 Vendor and Supply Management
Lesson 7: Secure Design and Implementation,
190min of course
7.1 Secure Design Principles
7.2 Security Zones
7.3 Wireless Connectivity
7.4 Firewalls
7.5 Network Access Control
7.6 Access Control Management
7.7 Cryptographic Primer
7.8 Encryption
7.9 Hashing and Digital Signatures
7.10 PKI and Digital Certificates
7.11 Secure Protocols
7.12 Site and Building Security
Module 4 - Incident Management
Lesson 8: Incident Management, 80min of course
8.1 Incident Management Planning
8.2 Business Impact Analysis
8.3 Resiliency Concepts
8.4 Backup and Recovery
8.5 Security Incident Response Planning
8.6 Disaster Recovery and Business Continuity Plan
8.7 Plan Readiness
Lesson 9: Attack Vectors, 80min of course
9.1 Malware
9.2 Social Engineering
9.3 Digital Infrastructure Attacks
9.4 Validation Attacks
9.5 Environmental Impact
Lesson 10: Security Incident Response, 90min of course
10.1 Incident Response
10.2 Detection and Response Tools
10.3 Evidence Handling
10.4 Forensic Examination
10.5 Disclosure and Notification
Al final de este curso, estará en un paso para obtener la certificación en: