Cybersecurity_Level 2
Advanced Cybersecurity Analysis: Incident Response, Threat Intelligence, and Forensic Techniques. This course is very comprehensive, practical, hands-on, and lecture-led and builds on Level 1 with more advanced concepts and tools.
Investment: 40,000 GMD
Highlights:
This comprehensive cybersecurity training course is designed to prepare students for roles such as Tier 1 and Tier 2 analysts in Security Operations Centers (SOC), Incident Response (IR) teams, and other cybersecurity-focused environments. The program provides in-depth knowledge of security operations workflows, threat detection, and incident response, equipping participants with the skills to handle phishing analysis, manage SIEM tools, triage alerts, and effectively respond to security incidents.
By integrating theoretical instruction, hands-on labs, real-world simulations, and industry-relevant certifications like CompTIA CySA+ and GIAC GCSA, the course ensures students are well-rounded professionals capable of tackling diverse challenges in cybersecurity. With an emphasis on practical exercises, critical thinking, and continuous learning, participants will build the expertise and confidence required to monitor, analyze, and mitigate security threats across various domains, fostering both proactive and reactive approaches essential to modern cybersecurity operations
Module 5: Security Information and Event Management (SIEM)
- Introduction to SIEM platforms like Splunk, QRadar, or open-source equivalents
- Writing queries and generating alerts
- Hands-on: Configuring a simple SIEM environment and practicing queries
Module 6: Incident Response and Forensics Basics
- Fundamentals of incident response (e.g., containment, eradication, recovery)
- Digital forensics basics: Imaging, memory forensics, and disk analysis
- Hands-on: Analyzing basic incidents using tools like FTK Imager or Autopsy
Module 7: Cyber Threat Intelligence
- Gathering and analyzing threat intelligence
- Using frameworks like MITRE ATT&CK for threat analysis
- Hands-on: Creating a basic threat intelligence report
Final Project
- Capstone: A simulated SOC environment where students:
- Analyze logs.
- Respond to a cyber incident.
- Create a detailed incident report and present it.
Course Information:
- Classes: Tuesdays and Fridays 4 PM to 6 PM
- Course Duration 1,5 Months
- Semester starts: March, October , January
- A personal Laptop is necessary but not compulsory
- Location: Bakpteh / Kololi Road, Opposite Manjaikunda Park. Manjai Kunda, KMC, Gambia
- Payment option: Bank Transfer at the beginning of the course
Responsible | African IT Academy - AITA |
---|---|
Last Update | 23/12/2024 |
Members | 2 |