Enterprise Security Fundamentals
-
110
-
- Write review
Overview
According to the Wall Street Journal, "All IT Jobs Are Cybersecurity Jobs Now."
In this course, we examine the concept of Red team - Blue team security professionals. You will practice Red team versus Blue team exercises, where one group of security pros--the red team--attacks some part or parts of a company's security infrastructure, and an opposing group--the blue team--defends against the attack. Both teams work to strengthen a company's defenses.
You'll learn how both the red and blue teams help the business attain a higher level of security, something the securityindustry is now calling the Purple team.
Note: These courses will retire in June. Please enroll only if you are able to finish your coursework in time.
Syllabus
Module 1 Understanding the cybersecurity landscape
- The current cybersecurity landscape
- The evolution of attacks
- Understanding "Assume Compromise"
- Examples of compromises
Module 2 Red Team: Penetration, lateral movement, escalation, and exfiltration
- Red Team versus Blue Team
- Red Team kill chain
- Beachhead
- Lateral movement
- Privileged escalation
- Execution of attacker's mission
Module 3 Blue Team: Detection, investigation, response, and mitigation
- The Blue Team kill chain
- Restricting privilege escalation
- On-premises network security
- Restrict lateral movement
- Attack detection
Module 4
- Organizational preparations
- Processes
- CIA Triad
- Developing a strategic roadmap
- Microsoft Security Response Center Exploitability Index
Taught by
Orin Thomas
Tags
Related Courses
-
Security Governance & Compliance
University of California, Irvine
-
CompTIA Security+ (SY0-601) Cert Prep: 9 Operations and Incident Response
-
Cybersecurity Roles, Processes & Operating System Security
IBM
-
Cybersecurity Roles and Operating System Security
IBM
3.0 -
Introduction to Cybersecurity Tools & Cyber Attacks
IBM
2.5 -
Cybersecurity Basics
IBM
Reviews
0.0 rating, based on 0 reviews