Security Fundamentals
Master essential security concepts, threat detection, vulnerability assessment, and security frameworks. Complete rooms in order to build your security knowledge step by step through hands-on exercises and real-world scenarios.
Threat Intelligence & Analysis Fundamentals
Learn to identify, analyze, and categorize security threats from various sources. Understand threat actors, their motivations, and techniques used in cyber attacks.
- Threat Actor Identification & Profiling
- Threat Intelligence Sources & Collection
- Attack Vector Analysis & Categorization
- Threat Prioritization & Risk Assessment
Access Control Systems & Identity Management
Master authentication, authorization, and accounting (AAA) principles. Learn about access control models, identity management, and privilege management.
- Authentication Methods & Protocols
- Authorization Models & Policies
- Identity & Access Management (IAM)
- Privileged Access Management
Risk Assessment Frameworks & Methodologies
Learn to assess and prioritize security risks using industry-standard frameworks. Conduct risk assessments and develop risk mitigation strategies.
- Risk Identification & Analysis Techniques
- NIST Risk Management Framework
- ISO 27005 Risk Assessment
- Risk Mitigation & Treatment Strategies
Security Frameworks: NIST, MITRE ATT&CK & CIS
Master industry-standard security frameworks including NIST Cybersecurity Framework, MITRE ATT&CK, and CIS Critical Security Controls.
- NIST Cybersecurity Framework Implementation
- MITRE ATT&CK Matrix & Techniques
- CIS Critical Security Controls
- Framework Mapping & Implementation
Vulnerability Assessment & Management
Learn vulnerability scanning, assessment, and management processes. Identify vulnerabilities, assess their impact, and implement remediation strategies.
- Vulnerability Scanning Techniques
- CVSS Scoring & Prioritization
- Vulnerability Management Lifecycle
- Remediation Planning & Tracking
Security Policies, Standards & Compliance
Understand security policy development, implementation, and compliance requirements. Learn about regulatory frameworks and compliance standards.
- Security Policy Development & Implementation
- Regulatory Compliance (GDPR, HIPAA, PCI DSS)
- Security Standards & Best Practices
- Compliance Auditing & Reporting
Incident Response & Handling Procedures
Master incident response lifecycle, procedures, and handling techniques. Learn to detect, contain, eradicate, and recover from security incidents.
- Incident Response Lifecycle & Phases
- Incident Detection & Classification
- Containment, Eradication & Recovery
- Post-Incident Analysis & Reporting
Security Governance & Program Management
Learn security governance frameworks, program management, and security metrics. Understand how to build and manage effective security programs.
- Security Governance Frameworks
- Security Program Development & Management
- Security Metrics & KPIs
- Security ROI & Business Alignment