Upload
lekhuong
View
225
Download
0
Embed Size (px)
Citation preview
Become the Complete Cyber Security Analyst
TM
QA.COM/CCSA0345 074 7978
Vulnerability Assessment& Management
Understanding MalwareReverse engineering Malware
Penetration Testing& Hacking Techniques
Penetrating TestingThe Art of Hacking
Third Party ProtectionCloud Security
Security Implementation
Incident Response & HuntingThreat Hunting
Attack and Defence
Digital ForensicInvestigationsDigital Forensics
Digital Investigations
Cyber Situational AwarenessCyber ThreatsCyber Crime
Threat IntelligenceCyber Intelligence - IntroductionCyber Intelligence - Advanced
Intrusion Detection& Prevention
Network SecurityWi-fi Security
Security InformationCollection & Analysis
SOC Analysis
Cyber SecurityOperations
Security ManagementIT Security Fundamentals
PART OF QA’S COMPLETE PROFESSIONAL SERIES
As part of QA’s Complete Professional Series, the Complete Cyber Security AnalystTM
skills for both the aspiring and experienced cyber professional, enabling an individual or organisation to develop broader, more capable cyber skills. The Complete Cyber Security AnalystTM provides industry recognised skills and certifications that are essential for a more complete cyber defender within a security operations role. These skills are recognised by the industry standard IISP skills framework.
Become the Complete Cyber Security AnalystTM
QA.COM/CCSA0345 074 7978
CORE SKILLSCYBER SECURITY OPERATIONS The development of skills vital for collective Cyber defence, including Cyber security risk management,implementation and maintenance of security standards, Cyber security ethics and the law. Security Management course code QACISMPIT Security Fundamentals course code QASECFUND
PROTECTVULNERABILITY ASSESSMENT AND MANAGEMENTThe provision of techniques and tools to enable the assessment of systems for vulnerabilities that would enable compromise. Understanding Malware course code QAMALReverse Engineering Malware course code QAIREMAL
PENETRATION TESTING AND HACKING TECHIQUES The use of a penetration testing methodology which employs a range of tactics, techniques and procedures which tests and reports on the security of infrastructure, devices, applications and humans within your environment. Penetration Testing course code QAPENTESTThe Art of Hacking course code QATAOH
THIRD PARTY PROTECTION The management, maintenance and protection of third party platforms including public and private cloud and encryption services. Cloud Security course code QAOCSSecurity Implementation course code QAPKI
RESPONDINCIDENT RESPONSE AND HUNTINGThe tools and techniques for proactively identifying and responding to Advanced Persistent Threats. Detect, deter and defend. Threat Hunting course code QACYHUNTAttack & Defence course code QACYDEFSOC
DIGITAL FORENSIC INVESTIGATIONS A range of digital forensic techniques and cyber
investigation skills to enable digital forensic response to cyber incidents, enabling source and impact of cyber incidents to be found. Digital Forensics course code QAIDIGFORDigital Investigations course code QAIDIGINV CYBER SITUATIONAL AWARENESS The use of all sources of Cyber information to gain Cyber situational awareness enabling a more strategic response to the current and emerging Cyber threat environment through proactive threat hunting. Cyber Threats course code QACYTHREATCyber Crime course code QACYCRIME
DETECTINTRUSION DETECTION AND PREVENTIONThe tactics, techniques and procedures to collect, analyse, identify, prevent and respond to malicious activities on the network using full packet capture and logs. Network Security course code QACYNETSECWi-Fi Security course code QAWIFICYSEC
THREAT INTELLIGENCE The collection and analysis of open / closed source information to enhance our understanding of the digital world and to identify the sources of intelligence thatcan support our Cyber defence, response, management and penetration testing goals. Cyber Intelligence Intro course code QAOSCIICyber Intelligence Advanced course code QAOSCIA
SECURITY INFORMATION COLLECTION AND ANALYSIS The configuration and management of security event data from many system sources including end points and network security devices. The use of Security Information and Event Management (SIEM) correlation engines to analyse and identify realtime security related events. SOC Analyst course code QASOCFOU
QA’s Cyber Security experts have curated and developed many of the courses in The Complete Cyber Security AnalystTM series allowing individuals and organisations prevent and respond to
attacks through their gained expertise and knowledge of cyber defence including risk management, implementation and management of security standards, cyber security ethics and the law.
PART OF QA’S COMPLETE PROFESSIONAL SERIES