Loading...

Course Description

This course provides a comprehensive introduction to the defensive security strategies, tools, and methodologies used by professional cybersecurity teams. Students will gain hands-on experience in cybersecurity operations, with practical training on industry-standard tools. The course also covers the processes involved in daily security monitoring, including how to collect, document, and respond to information during a cyber attack.

Course Details

Learning Outcomes

By the completion of this course, successful students will be able to:

  • Use defensive cybersecurity tools and techniques
  • Monitor, detect, and respond to cybersecurity incidents
  • Carry out cybersecurity operations and daily monitoring activities
  • Prepare documentation and reporting for security incidents

Course Components:

Lectures (Theory Component):

  • Defensive Security Strategies and Techniques
  • Cybersecurity Operations and Incident Response
  • Tools for Defensive Cybersecurity (SIEM, IDS/IPS, EDR)
  • Daily Security Monitoring and Reporting Processes

Cyber Range-Based Labs (Hands-On Component):

  • Configuring and Using SIEM Tools for Threat Detection
  • Conducting Incident Response and Threat Mitigation Exercises
  • Simulating Security Operations in a Live Environment
Loading...

Thank you for your interest...

Unfortunately, this course is not currently open for enrolment.

If you have a Professional and Continuing Education account, take note of the course number and submit a course inquiry to be notified if new sections become available.

Questions?

Required fields are indicated by .