2
Become the Complete Cyber Security Analyst TM QA.COM/CCSA 0345 074 7978 Vulnerability Assessment & Management Understanding Malware Reverse engineering Malware Penetration Testing & Hacking Techniques Penetrating Testing The Art of Hacking Third Party Protection Cloud Security Security Implementation Incident Response & Hunting Threat Hunting Attack and Defence Digital Forensic Investigations Digital Forensics Digital Investigations Cyber Situational Awareness Cyber Threats Cyber Crime Threat Intelligence Cyber Intelligence - Introduction Cyber Intelligence - Advanced Intrusion Detection & Prevention Network Security Wi-fi Security Security Information Collection & Analysis SOC Analysis Cyber Security Operations Security Management IT Security Fundamentals PART OF QA’S COMPLETE PROFESSIONAL SERIES As part of QA’s Complete Professional Series, the Complete Cyber Security Analyst TM skills for both the aspiring and experienced cyber professional, enabling an individual or organisation to develop broader, more capable cyber skills. The Complete Cyber Security Analyst TM provides industry recognised skills and certifications that are essential for a more complete cyber defender within a security operations role. These skills are recognised by the industry standard IISP skills framework.

Become the Complete Cyber Security Analyst TM - QA the Complete Cyber Security AnalystTM 0345 074 7978 QA.COM/CCSA ... Network Security Wi-fi Security

Embed Size (px)

Citation preview

Become the Complete Cyber Security Analyst

TM

QA.COM/CCSA0345 074 7978

Vulnerability Assessment& Management

Understanding MalwareReverse engineering Malware

Penetration Testing& Hacking Techniques

Penetrating TestingThe Art of Hacking

Third Party ProtectionCloud Security

Security Implementation

Incident Response & HuntingThreat Hunting

Attack and Defence

Digital ForensicInvestigationsDigital Forensics

Digital Investigations

Cyber Situational AwarenessCyber ThreatsCyber Crime

Threat IntelligenceCyber Intelligence - IntroductionCyber Intelligence - Advanced

Intrusion Detection& Prevention

Network SecurityWi-fi Security

Security InformationCollection & Analysis

SOC Analysis

Cyber SecurityOperations

Security ManagementIT Security Fundamentals

PART OF QA’S COMPLETE PROFESSIONAL SERIES

As part of QA’s Complete Professional Series, the Complete Cyber Security AnalystTM

skills for both the aspiring and experienced cyber professional, enabling an individual or organisation to develop broader, more capable cyber skills. The Complete Cyber Security AnalystTM provides industry recognised skills and certifications that are essential for a more complete cyber defender within a security operations role. These skills are recognised by the industry standard IISP skills framework.

Become the Complete Cyber Security AnalystTM

QA.COM/CCSA0345 074 7978

CORE SKILLSCYBER SECURITY OPERATIONS The development of skills vital for collective Cyber defence, including Cyber security risk management,implementation and maintenance of security standards, Cyber security ethics and the law. Security Management course code QACISMPIT Security Fundamentals course code QASECFUND

PROTECTVULNERABILITY ASSESSMENT AND MANAGEMENTThe provision of techniques and tools to enable the assessment of systems for vulnerabilities that would enable compromise. Understanding Malware course code QAMALReverse Engineering Malware course code QAIREMAL

PENETRATION TESTING AND HACKING TECHIQUES The use of a penetration testing methodology which employs a range of tactics, techniques and procedures which tests and reports on the security of infrastructure, devices, applications and humans within your environment. Penetration Testing course code QAPENTESTThe Art of Hacking course code QATAOH

THIRD PARTY PROTECTION The management, maintenance and protection of third party platforms including public and private cloud and encryption services. Cloud Security course code QAOCSSecurity Implementation course code QAPKI

RESPONDINCIDENT RESPONSE AND HUNTINGThe tools and techniques for proactively identifying and responding to Advanced Persistent Threats. Detect, deter and defend. Threat Hunting course code QACYHUNTAttack & Defence course code QACYDEFSOC

DIGITAL FORENSIC INVESTIGATIONS A range of digital forensic techniques and cyber

investigation skills to enable digital forensic response to cyber incidents, enabling source and impact of cyber incidents to be found. Digital Forensics course code QAIDIGFORDigital Investigations course code QAIDIGINV CYBER SITUATIONAL AWARENESS The use of all sources of Cyber information to gain Cyber situational awareness enabling a more strategic response to the current and emerging Cyber threat environment through proactive threat hunting. Cyber Threats course code QACYTHREATCyber Crime course code QACYCRIME

DETECTINTRUSION DETECTION AND PREVENTIONThe tactics, techniques and procedures to collect, analyse, identify, prevent and respond to malicious activities on the network using full packet capture and logs. Network Security course code QACYNETSECWi-Fi Security course code QAWIFICYSEC

THREAT INTELLIGENCE The collection and analysis of open / closed source information to enhance our understanding of the digital world and to identify the sources of intelligence thatcan support our Cyber defence, response, management and penetration testing goals. Cyber Intelligence Intro course code QAOSCIICyber Intelligence Advanced course code QAOSCIA

SECURITY INFORMATION COLLECTION AND ANALYSIS The configuration and management of security event data from many system sources including end points and network security devices. The use of Security Information and Event Management (SIEM) correlation engines to analyse and identify realtime security related events. SOC Analyst course code QASOCFOU

QA’s Cyber Security experts have curated and developed many of the courses in The Complete Cyber Security AnalystTM series allowing individuals and organisations prevent and respond to

attacks through their gained expertise and knowledge of cyber defence including risk management, implementation and management of security standards, cyber security ethics and the law.

PART OF QA’S COMPLETE PROFESSIONAL SERIES