Defensive Cyber Operations/Blue Teaming (13hrs)

  • Overview
  • Course Content
  • Requirements & Materials
Overview

Defensive Cyber Operations/Blue Teaming (13hrs)

Course Description

This lab-based course will introduce you to modern defensive skills required to counteract cyber threats. You will use live equipment and virtual machines representing “blue forces” tasked to negate real-world threats against systems and networks. Instructors will place particular emphasis on modeling current attack chains and the various techniques used to detect their tell-tale signatures.

Course Content

INTRODUCTION TO DEFENSIVE CYBER OPERATIONS/BLUE TEAMING

DEFENSIVE CYBER OPERATIONS TOOLS/CAPABILITIES

  • Prevention/detection tools
  • Response/forensic tools

MAPPING ATTACKS TO DEFENSIVE CAPABILITIES

THREE TIERS OF CAPABILITY/VISIBILITY

  • Perimeter monitoring
  • Internal network monitoring
  • Endpoint monitoring

DEFENSIVE CYBER OPERATIONS LAB

  • Post-compromise assessment
Requirements & Materials
Prerequisites
Materials

Provided

  • Notebooks
  • Laptops for use during the class

Session Details

  • Georgia Tech Research Institute (GTRI) employees are eligible to receive a discount.  If you are a GTRI employee, please go to the Organizational Development website and look for the coupon code under GT Professional Development. Review coupon instructions for more information.

Who Should Attend

This course is designed for information security personnel tasked with the defense of critical systems, networks, and infrastructure; system administrators and advanced programmers; web developers; and database administrators.

Defense technology professional attending professional short course

What You Will Learn

  • Defensive cyber operations tools/capabilities
  • How to map attacks to defensive capabilities
  • Perimeter monitoring
  • Internal network monitoring
  • Endpoint monitoring
Cybersecurity professional working on computer

How You Will Benefit

  • Gain understanding of prevention/detection and response/forensic tools.
  • Develop the ability to identify Indicators of Compromise (IOCs) and Tactics, Techniques, and Procedures (TTPs).
  • Map defensive technology capabilities.
  • Determine effective remediation strategies.
  • Learn about the three tiers of capability/visibility: perimeter monitoring, internal network monitoring, and endpoint monitoring.
  • Explore hands-on labs that utilize firewalls, intrusion detection systems, and a malware sandbox.
  • Taught by Experts in the Field icon
    Taught by Experts in the Field
  • Grow Your Professional Network icon
    Grow Your Professional Network

The course schedule was well-structured with a mix of lectures, class discussions, and hands-on exercises led by knowledgeable and engaging instructors.

- Abe Kani
President

TRAIN AT YOUR LOCATION

We enable employers to provide specialized, on-location training on their own timetables. Our world-renowned experts can create unique content that meets your employees' specific needs. We also have the ability to deliver courses via web conferencing or on-demand online videos. For 15 or more students, it is more cost-effective for us to come to you.

  • Save Money
  • Flexible Schedule
  • Group Training
  • Customize Content
  • On-Site Training
  • Earn a Certificate
Learn More

Want to learn more about this course?