CAT 340 - Blue Teaming and Cybersecurity Operations
Course Description
This course provides a comprehensive introduction to the defensive security strategies, tools, and methodologies used by professional cybersecurity teams. Students will gain hands-on experience in cybersecurity operations, with practical training on industry-standard tools. The course also covers the processes involved in daily security monitoring, including how to collect, document, and respond to information during a cyber attack.
Course Details
Learning Outcomes
By the completion of this course, successful students will be able to:
- Use defensive cybersecurity tools and techniques
- Monitor, detect, and respond to cybersecurity incidents
- Carry out cybersecurity operations and daily monitoring activities
- Prepare documentation and reporting for security incidents
Course Components:
Lectures (Theory Component):
- Defensive Security Strategies and Techniques
- Cybersecurity Operations and Incident Response
- Tools for Defensive Cybersecurity (SIEM, IDS/IPS, EDR)
- Daily Security Monitoring and Reporting Processes
Cyber Range-Based Labs (Hands-On Component):
- Configuring and Using SIEM Tools for Threat Detection
- Conducting Incident Response and Threat Mitigation Exercises
- Simulating Security Operations in a Live Environment