Cyber Security Analyst Learning Path

Blue Team

Lesson 1: Explaining the Importance of Security Controls and Security Intelligence

Topic 1A: Identify Security Control Types

Review Activity: Security Control Types

Topic 1B: Explain the Importance of Threat Data and Intelligence

Review Activity: Threat Data and Intelligence

Lesson 1: Practice Questions

Lesson 1 PBQ: Explaining the Importance of Security Controls and Security Intelligence

https://hack.technoherder.com/cybersecurity-control/


Lesson 2: Utilizing Threat Data and Intelligence

Topic 2A: Classify Threats and Threat Actor Types

Review Activity: Threats and Threat Actor Types

https://hack.technoherder.com/classify-threats-and-threat-actor-types/

Topic 2B: Utilize Attack Frameworks and Indicator Management

Review Activity: Attack Frameworks and Indicator Management

https://hack.technoherder.com/utilize-attack-frameworks-and-indicator-management/

Topic 2C: Utilize Threat Modeling and Hunting Methodologies

Review Activity: Threat Modeling and Hunting Methodologies

https://hack.technoherder.com/utilize-threat-modeling-and-hunting-methodologies/

Lesson 2: Practice Questions

Lesson 2 PBQ: Utilizing Threat Data and Intelligence

https://hack.technoherder.com/utilizing-threat-data-and-intelligence-practice-questions/


Lesson 3: Analyzing Security Monitoring Data

Topic 3A: Analyze Network Monitoring Output

Review Activity: Network Monitoring Output Analysis

https://hack.technoherder.com/analyzing-security-monitoring-data/

Topic 3B: Analyze Appliance Monitoring Output

Review Activity: Appliance Monitoring Output Analysis

https://hack.technoherder.com/analyze-appliance-monitoring-output/

Topic 3C: Analyze Endpoint Monitoring Output

Review Activity: Endpoint Monitoring Output Analysis

https://hack.technoherder.com/analyze-endpoint-monitoring-output/

Topic 3D: Analyze Email Monitoring Output

Review Activity: Email Monitoring Output Analysis

https://hack.technoherder.com/analyze-email-monitoring-output/

Lesson 3: Practice Questions

Lesson 3 PBQ: Analyzing Security Monitoring Data

https://hack.technoherder.com/analyzing-security-monitoring-data-practice-questions/

Leave a Reply

Your email address will not be published. Required fields are marked *