



Performing Account and Permissions Audits.Assessing the Impact of Regulation on Vulnerability Management.Configuring Vulnerability Scanning and Analyzing Outputs.Deploy Security Content Automation Protocol (SCAP.You’ll end your bootcamp with your second belt exam and your voucher for the CompTIA CySA+ certification exam. Collecting and Validating Digital Evidenceīy the end of the program, students will be able to configure and apply threat intelligence, conduct vulnerability assessments and mitigation, investigate data to provide continuous security monitoring, analyze potential indicators of compromise, apply incident response protocols in support of risk mitigation, and conduct basic threat hunting.Analyzing, Filtering, and Searching Event Log and syslog Output.Investigating Threat Data and Intelligence Sources.Managing Incident Response, Mitigation and Recovery.Managing Data Sources for Incident Response.Vulnerability management, assessment, and analysis.

You will also take your first belt exam and receive the voucher to take the Security+ certification exam. Configuring an Intrusion Detection Systemīy completing this track, students will be able to demonstrate to prospective employers basic security skills required to install and configure systems to secure applications, networks, and devices perform threat analysis and respond with appropriate mitigation techniques participate in risk mitigation activities and operate with an awareness of applicable policies and regulations.Performing Network Reconnaissance and Vulnerability Scanning.Installing, Using, and Blocking a Malware-based Backdoor.Auditing Passwords with a Password Cracking Utility.Analyzing the Results of a Credentialed Vulnerability Scan.Intercepting and Interpreting Network Traffic with Packet Sniffing.Completing essential cybersecurity reading and assignments to familiarize yourself with the framework and foundations of cybersecurity.Review of the resources we use to stay "in the know" about cybersecurity related info.Will cover the schedule, stack expectations, certification process, and graduation.
