reed.co.uk Courses

Header

Cyber Intelligence Officer - CPD Accredited

Exam & Tutor Support Included With The Course Price | Instant Result | | No Hidden Fees | 12 Months Access


One Education

Summary

Price
Save 96%
£17 inc VAT (was £425)
Offer ends 22 November 2019
Study method
Online, self-paced
Duration
70 Hours
Access to content
12 Months
Qualification
40 CPD points / hours
Additional info
  • Exam(s) / assessment(s) is included in price
  • Tutor is available to students

4 students purchased this course

Add to basket or enquire

Overview

A complete video course that will help you to become a Cyber Intelligence Officer that looks to protect networks, computers, programs and data from attack, damage or unauthorised access.

In this very detailed course you will learn everything from an overview of wireless communications through to phishing, threat landscapes, recon operations, evaluating a company’s security among many other cyber security techniques and protecting methods.

The Cyber Intelligence Officer training course covers; reconning, analyzing threats, understanding phishing, post-attack techniques, mitigation strategies, analysis and data, investigation, security system overviews and much more.

Highlights of The Cyber Intelligence Officer:

  • Improve your understand cyber security systems
  • Identify potential threats to a companies cyber systems
  • Perform network analysis
  • Analyse data and log information
  • Assessing post cyber attack techniques
  • Understanding encryption
  • Encryption Key Generation
  • Implementing security monitoring
  • Understanding security governance

Course media

Description

We’ve taken this comprehensive Cyber Intelligence Officer course and broken it down into 217 manageable units which we believe will assist you to easily grasp each concept – from the fundamental to the most advanced aspects of the Cyber Officer Skills. It really is a sure pathway to success.

This course is designed with the following modules:

Overview of Wireless Communications

  • Identify the Importance of Risk Management
  • Assess Risk
  • Mitigate Risk
  • Integrate Documentation into Risk Management

Analyzing the Threat Landscape

  • Classify Threats and Threat Profiles
  • Perform Ongoing Threat Research
  • Resources that Aid in Research of Threats

Analyzing Recon Threats to Computing and Network Environments

  • Implement Threat Modeling
  • Assess the Impact of Reconnaissance Incidents
  • Performing Reconnaissance on a Network
  • Examining Reconnaissance Incidents
  • Assess the Impact of Social Engineering
  • Assessing the impact of Social Engineering
  • Assessing the Impact of Phishing

Analyzing Attacks on Computing and Network Environments

  • Assess the Impact of System Hacking Attacks
  • Cracking Passwords Using a Password File
  • Assess the Impact of Web Based Attacks
  • Assessing the Impact of Web-Based Threats
  • And much more...

Analyzing Post-Attack Techniques

  • Assess Command and Control Techniques
  • Assessing Command and Control Techniques
  • Assess Persistence Techniques
  • Detecting Rootkits
  • Assess Lateral Movement and Pivoting Techniques
  • Assess Data Exfiltration Techniques
  • Steganography
  • Assess Anti Forensics Techniques
  • Assessing Anti-Forensics

Evaluating the Organization’s Security Posture

  • Conduct Vulnerability Assessments
  • Perform a Vulnerability Scan with Nessus
  • Perform a Vulnerability Scan with MBSA
  • Conduct Penetration Tests on Network Assets
  • Follow Up on Penetration Testing

Collecting Cyber security Intelligence

  • Deploy a Security Intelligence Collection and Analysis Platform
  • Collect Data from Network Based Intelligence Sources
  • Collecting Network-Based Security Intelligence
  • Collect Data from Host Based Intelligence Sources
  • Collecting Host-Based Security Intelligence
  • Parsing Log files

Analyzing Log Data

  • Use Common Tools to Analyze Logs
  • Analyzing Linux Logs for Security Intelligence
  • Use SIEM Tools for Analysis
  • Incorporating SIEMs into Security Intelligence Analysis
  • Parse Log Files with Regular Expressions

Performing Active Asset and Network Analysis

  • Analyze Incidents with Windows-Based Tools
  • Windows-Based Incident Analysis Tools
  • Analyze Incidents with Linux Based Tools
  • Linux-Based Incident Analysis Tools
  • Analyze Malware
  • Analyzing Malware
  • Analyze Indicators of Compromise
  • Analyzing Indicators of Compromise

Responding to Cyber security Incidents

  • Deploy an Incident Handling and Response Architecture
  • Mitigate Incidents
  • Hardening Windows Servers
  • DNS Filtering
  • Blacklisting and Whitelisting
  • Prepare for Forensic Investigation as a CSIRT

Investigating Cyber security Incidents

  • Apply a Forensic Investigation Plan
  • Securely Collect and Analyze Electronic Evidence
  • Securely Collecting Electronic Evidence
  • Analyzing Forensic Evidence
  • Follow Up on the Results of an Investigation

WLAN Security Overview

  • WLAN Security Overview and Data Privacy
  • Networking Basics
  • Web GUI Introduction
  • Security Options

Legacy Security

  • Legacy Security
  • VPNs
  • Security Association
  • MAC Spoofing

Encryption Ciphers and Methods

  • Encryption Ciphers and Methods
  • TKIP
  • CCMP
  • Encryption Examples

802.11 Authentication Methods

  • 802.11 Authentication Methods
  • 802.1X
  • EAP
  • Certified Authority Server Credentials

Dynamic Encryption Key Generation

  • Dynamic Encryption Key Generation
  • Authentication and Key Management
  • RSNA Key Hierarchy
  • EAP
  • Information Elements

SOHO 802.11 Security

  • SOHO 802.11 Security
  • Wi-Fi Protected Setup (WPS)
  • Cracking Hashes

Fast Secure Roaming

  • Fast Secure Roaming
  • PMKSA
  • FT Key Hierarchy (e-notes)
  • 802.11K-2008

Wireless Security Risks

  • Wireless Security Risks
  • Authentication Attacks
  • Rogue Devices
  • Public Hotspots

Wireless LAN Security Auditing

  • Wireless LAN Security Auditing

Wireless Security Monitoring

  • Wireless Security Monitoring
  • Device Tracking

VPNs, Remote Access and Guest Access Services

  • VPNs, Remote Access and Guest Access Services
  • Remote Access

WLAN Security Infrastructure

  • WLAN Security Infrastructure
  • Management Protocols
  • Other RADIUS Solutions

Wireless Security Policies

  • Wireless Security Policies
  • Other Policies

Information Security Governance

  • Information Security Governance Overview
  • Effective Information Security Governance
  • Information Security Concepts and Technologies
  • Information Security Manager
  • Scope and Charter of Information Security Governance
  • Information Security Governance Metrics
  • Information Security Strategy Overview
  • Creating Information Security Strategy

Information Risk Management

  • Risk Management Overview
  • Good Information Security Risk Management
  • Information Security Risk Management Concepts
  • Implementing Risk Management
  • And much more...

Information Security Program Development

  • Development of Information Security Program
  • Information Security Program Objectives
  • Information Security Program Development Concepts
  • Scope and Charter of Information Security Program Development
  • Information Security Management Framework
  • And much more....

Information Security Incident Management

  • Incident Management Overview
  • Incident Response Procedures
  • Incident Management Organization
  • Incident Management Resources
  • Incident Management Objectives
  • Incident Management Metrics and Indicators
  • And much more..

Healthcare Information Systems Security

  • The Healthcare Industry
  • The Healthcare Regulatory Environment
  • Privacy and Security in Healthcare
  • Information Governance and Risk Management
  • Information Risk Assessment
  • Third-Party Risk Management

Disaster Recovery

  • Welcome to Disaster Recovery Training
  • Business Impact Analysis
  • Risk Analysis8
  • BCP Strategies
  • IT Recovery Strategies
  • Implementation Phase
  • And much more...

Digital Forensics Examination

  • Computer Forensic Incidents
  • Investigation Process
  • Disk Storage Concepts
  • Digital Acquisition & Analysis
  • And much more...

Incident Handling Engineer

  • Threats, Vulnerabilities and Exploits
  • IH Preparation
  • Request Tracker for Incident Handling
  • Preliminary Response
  • Identification and Initial Response
  • Sysinternals
  • Containment
  • Eradication
  • And much more....

Security Leadership Officer

  • Security Management
  • Risk Management
  • Encryption
  • Information Security – Access Control Concepts
  • Incident Handling and Evidence
  • Operations Security
  • Knowing Network Security

Security Sentinel

  • Basic Security
  • User Awareness
  • Implementing Countermeasures
  • Certified Security Sentinel
  • Using the Internet at Work
  • And much more...

How is the course assessed?

To successfully complete the Cyber Intelligence Officer course you must pass an automated, multiple-choice assessment. The assessment is delivered through our online learning platform. You will receive the results of your assessment immediately upon completion.

Will I receive a certificate of completion?

Upon successful course completion, you will qualify for a CPD certificate from One Education as proof of your new skills. Certification is available in PDF format, at the cost of £9, or a hard copy can be sent to you via post, at the cost of £15.

Who is this course for?

Whether you’re an existing practitioner or aspiring professional, this Cyber Intelligence Officer course will enhance your expertise and boost your CV with key skills and an accredited qualification attesting to your knowledge.

Requirements

This course is compatible with all kinds of devices and the age requirement for this Cyber Intelligence Officer course is 16. So, basically, everyone can take this course to acquire this skills that are necessary.

Questions and answers

Currently there are no Q&As for this course.Be the first to ask a question.

Rating and reviews

There haven't been any reviews for this course yet.

Leave a review

Modals