< Back to Skils in Cyber

CYBER DEFENSE

Powered by European Digital Innovation Hub Trakia

About the training

In addition to the main core course content on cyber defense practices, tools and techniques, students also have the opportunity to apply their knowledge through hands-on lab exercises and real-world case studies. The course intends to introduce various tools and techniques used by ‘Blue Team’ professionals, including both open source and commercial tools.

What you will learn

     - Basics of networking, host-based;
     - Systems, and active directory;
     - Threat and Vulnerability Management;
     - Security Operations & Monitoring;
     - Incident Response and Forensics;
     - Basic Malware Analysis.

Training information

Cyber Defense is a course that provides an in-depth introduction to the principles and practices of cyber defense. This course is designed for individuals with little to no experience in cybersecurity, but who are interested in learning more about the techniques and tools used to protect against cyber attacks. Throughout the course, students learn about the various types of cyber attacks and the motivations behind them. The course covers topics like malware, ransomware, and phishing attacks, as well as more advanced threats like zero-day exploits and advanced persistent threats (APTs).


In addition to learning about the various types of cyber attacks, students also learn about the tools and techniques used to defend against these threats. The course covers topics like intrusion detection and prevention, network security, and incident response. Students also learn about the importance of regular security assessments and how to implement effective security policies and procedures.


In addition to the core course content, students also have the opportunity to apply their knowledge through hands-on lab exercises and real-world case studies. These hands-on activities give students the opportunity to practice their cyber defense skills in a controlled environment, and also helps them to develop a deeper understanding of the challenges and complexities of cybersecurity.


By the end of the course, students have a solid foundation in the principles of cyber defense and are well-prepared to pursue more advanced training and certification in the field. In addition, students gain a deep understanding of the various types of cyber attacks and are able to apply this knowledge to identify and mitigate cybersecurity risks in real-world settings.


The typical training ideally incorporates 32 hours (4 days) seminar for 8 attendees with the following agenda:



  • Basics of networking, host-based systems, and active directory - This syllabus point covers the basics of computer networking, host-based systems, and active directory. Students learn about the components of a network and how they interact to enable communication and data transfer. The syllabus point also covers topics like network protocols and services, as well as the basics of host-based systems and active directory.

  • Threat and Vulnerability Management - This syllabus point covers the principles and practices of threat and vulnerability management, including the identification and assessment of security risks. Students learn about common security threats and vulnerabilities, as well as how to identify and prioritize these risks. The syllabus point also covers topics like threat intelligence and vulnerability management best practices.

  • Security Operations & Monitoring - This syllabus point covers the principles and practices of security operations and monitoring, including the use of tools and techniques to detect and respond to security incidents. Students learn about common security monitoring and detection techniques, as well as how to implement and maintain an effective security operations center (SOC). The syllabus point also covers topics like incident response and incident management.

  • Incident Response and Forensics - This syllabus point covers the principles and practices of incident response and forensics, including the investigation and analysis of security incidents. Students learn about the incident response process, as well as how to collect and analyze forensic evidence. The syllabus point also covers topics like digital forensics tools and techniques, as well as the legal and ethical considerations of incident response and forensics.

  • Basic Malware Analysis - This syllabus point covers the basics of malware analysis, including the use of tools and techniques to identify and analyze malware samples. Students learn about the different types of malware and how they operate, as well as how to use malware analysis tools to identify and understand the behavior of malware samples. The syllabus point also covers topics like reversing and disassembling malware, as well as the ethics and legal considerations of malware analysis.


When deemed appropriate, according to the client’s DMA and the course attendees, through this course the Hub assists organizations in getting on the path to compliance with the ISO/IEC 27001:2022 standard by learning the foundations for conducting proper cybersecurity gap analysis and developing a tailored implementation plan.


Certificate

Other (eg. certificate of attendance / participation)

Price

Free

Level

Entry-level (Those with an initial experience or cybersecurity studies)

Teaching Method/s

Hybrid

Duration

1 to 3 days

Discount

No

Type

Training/course theoretical and hands on

Language/s

English , Bulgarian

Mentorship

Jobs in Cyber