What You Need to Know Before
You Start
Starts 20 June 2025 19:59
Ends 20 June 2025
00
days
00
hours
00
minutes
00
seconds
3 hours 45 minutes
Optional upgrade avallable
Not Specified
Progress at your own speed
Free Online Course
Optional upgrade avallable
Overview
This course gives you a deep dive into the workflows of Tier 3 analysts.
Syllabus
- Course Overview
- Advanced Incident Response
- Vulnerability management for Tier 3 analysts
- Threat Modeling
- Security Engineering
- Splunk advanced: Lite management
- Resources
- Your Next Steps
Course 3 Overview
Module overview
Advanced incident response for Tier 3 analysts
Ad hoc incident response
Using an incident management plan for ad hoc incident response
Tools for advanced incident response
Endpoint Detection and Response (EDR) tools
Security Information and Event Management (SIEM) tools
Vulnerability scanners
Threat intelligence tools
Intrusion Detection and Prevention Systems (IDPS) tools
Digital forensic tools
Advanced incident response tools at Cymbal Federal
Metrics for evaluating incident response
Module overview
Introduction to vulnerability management
Vulnerability management systems (VMS)
The vulnerability management lifecycle
Vulnerability management on GDC
Techniques for vulnerability management
Vulnerability assessment
Vulnerability scanning
Penetration testing
Tools for penetration testing
Best practices for a vulnerability management program
Vulnerability management reports
Module summary
Knowledge check
Module overview
The modern threat landscape
Introduction to threat modeling
The threat modeling process
Threat modeling frameworks
Threat modeling frameworks at Cymbal Federal
Threat intelligence feeds
Introduction to modeling techniques
Title needs to be changed later
STRIDE at Cymbal Federal.mp4
Process for Attack Simulation and Threat Analysis (PASTA)
PASTA at Cymbal Federal
Common Vulnerability Scoring System (CVSS)
CVSS at Cymbal Federal
Selecting a threat modeling technique
SecOps-specific tools for threat modeling
SecOps-specific tools at Cymbal Federal
Threat mapping
Best practices for effective threat
Module summary
Knowledge check
Module overview.mp4
Introduction to security engineering
The Secure by Design approach
Secure by Design and SecOps
Security engineers in the SOC
The security engineering workflow
Introduction to security controls
Technical security controls
Administrative security controls
Tools for security engineers
Security engineering best practices
Module review
Knowledge check
Module overview
Introduction to Splunk management
Who is responsible for managing Splunk?
Configuration files in Splunk
Administering Splunk with Splunk Web and btool
Best practices and advanced troubleshooting in Splunk
Splunk management at Cymbal Federal
Module review
Knowledge check
Course slides
Additional resources
Course Badge
Subjects
Information Security (InfoSec)