Certcop – A division of Secbay Inc.
We combine the latest Cyber tools with original in-house designs to develop customized and advanced Cyber Security programs to meet the client’s requirements. CertCop offers training programs in the area of Pen testing using Kali Linux, Cyber Security Management, Incident Handling & Disaster Recovery, Application Security, Secure Coding, and customized SOC training programs according to client requirements.
- Certified and Highly Experienced Instructors
- Delivery Methods:
Virtual live / In-Class /On-site /1 on 1/ On-Demand - Certcop Flexible Scheduling (Day / Evening / Weekends)
- Certcop High Quality, Extensive and Industry Standard Curriculum
Certified Cybercop Blue Team – Defensive Security
The Certified Cybercop Blue Team program is designed to teach and evaluate real defensive security abilities across a wide variety of blue-team disciplines, making it ideal for newcomers to the sector as well as seasoned security professionals.
Target Audience
- Security/Network Defender
- IT Employs
- Security enthusiasts
- Students
- Entry-level Cybersecurity Position
Pre Requirements
This course requires a basic familiarity with TCP/IP and operating system principles. It’s a plus if you’re familiar with the Linux command line, network security monitoring, and SIEM technologies. Some fundamental security concepts are expected at this level.
Exam Details:
- Required exam—- Certified Cybercop Blue Team
- Number of questions—- Maximum of 90
- Types of questions—- Multiple-choice and performance-based
- Length of test—- 180 minutes
- Passing score—- 70%
Course Content
- CHAPTER 1 Blue Team Methodology
- CHAPTER 2 Recruiting Blue Team Members
- CHAPTER 3 Inro to Linux
- CHAPTER 4 Setting Localization Options
- CHAPTER 5 Sifting through Services
- CHAPTER 6 Package Management and Repositories
- CHAPTER 7 Kali Linux Bash Scripting
- CHAPTER 8 Linux Firewalls
- CHAPTER 9 Identity and Access (IAM)
- CHAPTER 10 Vulnerability Scanning
- CHAPTER 11 Threat and Vulnerability Management
- CHAPTER 12 Security Information and Event Management (SIEM)
- CHAPTER 13 Incident Response Toolkit/Process
- CHAPTER 14 Digital Forensics
- CHAPTER 15 SOAR – Security Orchestration Automation Response
- CHAPTER 16 Policies to Mitigate Risk
- CHAPTER 17 Software and Systems Security
- CHAPTER 18 Software Development Life Cycle (SDLC)
- CHAPTER 19 Mobile Device Hacking
- CHAPTER 20 Cryptography and PKI
Course Features
- Lectures 30
- Quizzes 0
- Duration 18.5 hours
- Skill level All levels
- Language English
- Students 275
- Certificate Yes
- Assessments Yes