Lesson 1: Explaining the Importance of Security Controls and Security Intelligence
Topic 1A: Identify Security Control Types
Review Activity: Security Control Types
Topic 1B: Explain the Importance of Threat Data and Intelligence
Review Activity: Threat Data and Intelligence
Lesson 1: Practice Questions
Lesson 1 PBQ: Explaining the Importance of Security Controls and Security Intelligence
https://hack.technoherder.com/cybersecurity-control/
Lesson 2: Utilizing Threat Data and Intelligence
Topic 2A: Classify Threats and Threat Actor Types
Review Activity: Threats and Threat Actor Types
https://hack.technoherder.com/classify-threats-and-threat-actor-types/
Topic 2B: Utilize Attack Frameworks and Indicator Management
Review Activity: Attack Frameworks and Indicator Management
https://hack.technoherder.com/utilize-attack-frameworks-and-indicator-management/
Topic 2C: Utilize Threat Modeling and Hunting Methodologies
Review Activity: Threat Modeling and Hunting Methodologies
https://hack.technoherder.com/utilize-threat-modeling-and-hunting-methodologies/
Lesson 2: Practice Questions
Lesson 2 PBQ: Utilizing Threat Data and Intelligence
https://hack.technoherder.com/utilizing-threat-data-and-intelligence-practice-questions/
Lesson 3: Analyzing Security Monitoring Data
Topic 3A: Analyze Network Monitoring Output
Review Activity: Network Monitoring Output Analysis
https://hack.technoherder.com/analyzing-security-monitoring-data/
Topic 3B: Analyze Appliance Monitoring Output
Review Activity: Appliance Monitoring Output Analysis
https://hack.technoherder.com/analyze-appliance-monitoring-output/
Topic 3C: Analyze Endpoint Monitoring Output
Review Activity: Endpoint Monitoring Output Analysis
https://hack.technoherder.com/analyze-endpoint-monitoring-output/
Topic 3D: Analyze Email Monitoring Output
Review Activity: Email Monitoring Output Analysis
https://hack.technoherder.com/analyze-email-monitoring-output/
Lesson 3: Practice Questions
Lesson 3 PBQ: Analyzing Security Monitoring Data
https://hack.technoherder.com/analyzing-security-monitoring-data-practice-questions/