Threat Analysis

This course is part of Cybersecurity Operations Fundamentals Specialization

Instructor: Cisco Learning & Certifications

Skills you'll gain

  •   Computer Security Incident Management
  •   SQL
  •   Incident Response
  •   Cybersecurity
  •   Network Security
  •   Cyber Threat Intelligence
  •   Malware Protection
  •   Threat Detection
  •   MITRE ATT&CK Framework
  •   Network Analysis
  •   Network Monitoring
  •   Threat Modeling
  • There are 4 modules in this course

    •Use the classic kill chain model to perform network security incident analysis • Describe the reconnaissance phase of the classic kill chain model • Describe the weaponization phase of the classic kill chain model • Describe the delivery phase of the classic kill chain model • Describe the exploitation phase of the classic kill chain model •Describe the installation phase of the classic kill chain mode l• Describe the command-and-control phase of the classic kill chain model • Describe the actions on objectives phase of the classic kill chain model • Describe how the kill chain model can be applied to detect and prevent ransomware • Describe using the diamond model to perform network security incident analysis • Describe how to apply the diamond model to perform network security incident analysis using a threat intelligence platform, such as ThreatConnect • Describe the MITRE ATTACK framework and its use • Walk-through the classic kill chain model and use various tool capabilities of the Security Onion Linux distribution •Understand the kill chain and the diamond models for incident investigations, and the use of exploit kits by threat actors. To be successful in this course, you should have the following background: 1. Skills and knowledge equivalent to those learned in Implementing and Administering Cisco Solutions (CCNA) v1.0 course 2. Familiarity with Ethernet and TCP/IP networking 3. Working knowledge of the Windows and Linux operating systems 4. Familiarity with basics of networking security concepts.

    Identifying Common Attack Vectors

    Identifying Malicious Activity

    Identifying Patterns of Suspicious Behavior

    Explore more from Security

    ©2025  ementorhub.com. All rights reserved