The course consists of a study volume, containing indexed notes and review questions, plus exam objectives mapping, exam information, and a comprehensive glossary. The course also comes with an online practice exam, pre-requisites test, and pre-/post-unit assessment tests plus written scenarios to test your ability to select appropriate technologies and configuration options for given tasks.
An instructor edition of the course is available with margin notes and tips for the trainer. Access to course resources (setup guides and data, PowerPoint slides, timetables, and extra exam information) on gtslearning's trainer portal is also available, subject to meeting minimum order requirements. A full set of classroom labs is provided to training companies and there are also options for hosted labs and self-paced labs to accompany the course.
Module 1 / Threat Management (1)
- Cybersecurity Analysts
- Cybersecurity Roles and Responsibilities
- Risk Assessment and Security Controls
- Penetration Testing Processes
- Reconnaissance Techniques
- Reconnaissance Processes
- Cyberstalking and Google Hacking
- Social Engineering
- Topology Discovery
- Service Discovery
Module 2 / Threat Management (2)
- Security Appliances
- Configuring Firewalls
- Intrusion Detection and Prevention
- Configuring IDS
- Malware Threats
- Configuring Anti-virus Software
- Logging and Analysis
- Packet Capture
- Packet Capture Tools
- Monitoring Tools
- Log Review and SIEM
- Data Analysis
Module 3 / Vulnerability Management
- Managing Vulnerabilities
- Vulnerability Management Processes
- Vulnerability Management Tools
- Configuring Vulnerability Scans
- Exploit Frameworks
- Remediating Vulnerabilities
- Analyzing Vulnerability Scans
- Remediation and Controls
- Identifying Common Vulnerabilities
- Software Management
- Software Development Lifecycle
- Software Security Testing
- Source Authenticity
- Reverse Engineering
Module 4 / Cyber Incident Response
- Incident Response
- Incident Response Processes
- Threat Classification
- Forensics Tools
- Forensics Investigation Suites
- Forensics Kits
- Image Acquisition
- Password Cracking
- Incident Analysis and Recovery
- Analysis and Recovery Frameworks
- Analyzing Network Symptoms
- Analyzing Host Symptoms
- Analyzing Application Symptoms
- Incident Recovery Processes
Module 5 / Security Architecture
- Access Management
- Network Hardening and Segmentation
- Blackholes, Sinkholes, and Honeypots
- Endpoint Security
- Network Access Control
- Identity Management
- Authentication Technologies
- Security Architecture
- Frameworks and Compliance
- Security Policies and Procedures
- Quality Control Processes
- Reviewing Security Architecture