🔒Hands-On Cybersecurity / SOC Analyst Training (REAL EXPERIENCE)🔒
We’re keeping the price at $497!
[ Ссылка ]
---
📄 Security+ Practice Questions Deck 📄 (SY0-701)
[ Ссылка ]
📄 CISSP Practice Questions Deck 📄
[ Ссылка ]
---
0:00 Intro
0:30 How to get actual experience
2:20 Why I think this course is the best
3:44 Personal Stats and the Course
4:10 How difficult is the course?
4:29 Can I get a job after the course?
5:40 What types of jobs can you apply to?
6:37 What branches of security does the course cover?
7:35 What exactly is taught in the course?
8:00 Theory Section Content
9:42 Lab Section Content
14:06 Job Hunt Section Content
15:15 Discord Support
15:40 How much does it cost
16:00 Free CompTIA Security+ Deck
17:40 Not only cybersecurity
---
josh madakor's cybersecurity course:
Free Intro:
Why Cybersecurity?
What is Cybersecurity?
How to Start Your Career in Cybersecurity
Theory:
Things to Keep in Mind
Course Layout: Theory and Labs
Podcast Recommendations: Start Listening Now!
ChatGPT: An Invaluable Tool
How and When to use Anki Flash Cards
Personal Stats (12 Pillars of Employability)
Final Thoughts before Diving In
Security Refresher:
CIA Triad
Security Controls
Advanced Persistent Threats (APTs)
What is Risk and How to Measure It
Wrapping Up
Security Frameworks:
NIST Introduction
NIST 800-37: Risk Management Framework
NIST 800-37: Risk Management Framework (Real World)
NIST 800-53: Security and Privacy Controls
NIST 800-61: Computer Security Incident Handling Guide
NIST Cybersecurity Framework
CIS Critical Security Controls
Security Regulations and Standards:
HIPAA / HITRUST
PCI-DSS
GDPR
Security Operations Centers:
Introduction
SIEM
Security Operations Centers: Indicators of Compromise (IoCs)
Labs:
Azure Cloud Computing with Azure Overview
Azure Creating our Subscription and First Resources
Azure Precursor to Security Operations (Failed auth, log observation)
Azure Azure Active Directory Overview (Users, Groups, and Access Management)
Azure Logging at Different Layers (Tenant, Activity, Resource)
Geo IP Data Ingestion + Log Analytics and Microsoft Sentinel (SIEM) Setup
Enable MDC and Configure Log Collection for Virtual Machines
KQL Deep Dive
Tenant Level Logging
Subscription Level Logging (Activity)
Resource Level Logging (Diagnostic Settings)
Introduction
World Maps Construction
Analytics, Alerting, and Incident Generation
Attack Traffic Generation
Run Insecure Environment for 24 Hours; Capture Analytics (Discussion)
Run Insecure Environment for 24 Hours; Capture Analytics (Actual Capture)
Incident 1 - Brute Force Success (Windows) - Working Incidents and Incident Response
Incident 2 - Possible Privilege Escalation - Working Incidents and Incident Response
Incident 3 - Brute Force Success (Linux) - Microsoft Sentinel Working Incidents and Incident Response
Incident 4 - Possible Malware Outbreak - Working Incidents and Incident Response
Regulatory Compliance (NIST 800-53, PCI DSS, CIS) and MDC Recommendations
Azure Private Link & Firewall for Resources
Run SECURE Environment for 24 Hours; Capture Analytics
Security Operations Centers: MITRE ATT&CK Framework
Job Hunt Preparation and Execution:
Introduction and Job Types
Personal Portfolio Setup
Resume Construction
Social Network Development (LinkedIn)
Interview Practice
12 Pillars of Employment Refresher
Job Hunting Template
Job Hunting Execution and Probability
Recommended Supplemental Learning Material
-
The Best Cyber Security Course on the Internet - by Josh Madakor
Ещё видео!