02. Course Outline
Course Outline Overview
Here's a quick look at what you'll learn throughout the course.
ND545 C3 L0 A08 Course Outline
Lesson Outline
During this lesson, we're going to cover:
- An introduction to threat, vulnerabilities, and incident response
- Key stakeholder involved in the process
- Do's and Dont's to remember
- The history and evolution of threats
- The tools you'll use throughout the course
- Your final project
- The course outline
Course Description
Cybersecurity breaches happen when a threat is able to successfully exploit a vulnerability within a business. To avoid these attacks, security professionals must understand threats the company is facing, including the various threat actors and their motivations. Security professionals must also be able to find vulnerabilities that can enable threats to attack through common practices such as vulnerability scanning and penetration testing. Finally, security professionals should be able to activate and follow incident response procedures to address cybersecurity incidents and breaches. Ultimately, during this course, students will learn how to identify security threats and gaps, fix issues, and respond to inevitable attacks.
Course Outline
Lesson One: Assessing Threats
- Explain the relationship between threats, threat actors, vulnerabilities, and exploits
- Utilize event context to identify potential threat actor motivations
- Identify security threats applicable to important organizational assets
- Use standard formulas to assess threats, identify risks, and prioritize
Lesson Two: Finding security vulnerabilities
- Leverage the MITRE ATT&CK framework to understand attack methods
- Configure and launch scans to find vulnerabilities
- Explain the steps required to conduct a penetration test
Lesson Three: Fixing Security Vulnerabilities
- Conduct vulnerability research using industry resources like MITRE CVE
- Validate scan results through manual testing and application of business context
- Prioritize security gaps discovered and recommend remediation strategies
Lesson Four: Preparing for inevitable attacks
- Explain the relationship between incident response, disaster recovery and business continuity
- Distinguish events from incidents and recognize indicators of compromise
- Explain the incident response lifecycle
- Recognize the key incident response team roles and core components of an incident response plan