Become the Complete Cyber Security Analyst TM QA.COM/CCSA 0345 074 7978 Vulnerability Assessment & Management Understanding Malware Reverse engineering Malware Penetration Testing & Hacking Techniques Penetrating Testing The Art of Hacking Third Party Protection Cloud Security Security Implementation Incident Response & Hunting Threat Hunting Attack and Defence Digital Forensic Investigations Digital Forensics Digital Investigations Cyber Situational Awareness Cyber Threats Cyber Crime Threat Intelligence Cyber Intelligence - Introduction Cyber Intelligence - Advanced Intrusion Detection & Prevention Network Security Wi-fi Security Security Information Collection & Analysis SOC Analysis Cyber Security Operations Security Management IT Security Fundamentals PART OF QA’S COMPLETE PROFESSIONAL SERIES As part of QA’s Complete Professional Series, the Complete Cyber Security Analyst TM skills for both the aspiring and experienced cyber professional, enabling an individual or organisation to develop broader, more capable cyber skills. The Complete Cyber Security Analyst TM provides industry recognised skills and certifications that are essential for a more complete cyber defender within a security operations role. These skills are recognised by the industry standard IISP skills framework.
2
Embed
Become the Complete Cyber Security Analyst TM - QA the Complete Cyber Security AnalystTM 0345 074 7978 QA.COM/CCSA ... Network Security Wi-fi Security
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
As part of QA’s Complete Professional Series, the Complete Cyber Security AnalystTM
skills for both the aspiring and experienced cyber professional, enabling an individual or organisation to develop broader, more capable cyber skills. The Complete Cyber Security AnalystTM provides industry recognised skills and certifications that are essential for a more complete cyber defender within a security operations role. These skills are recognised by the industry standard IISP skills framework.
CORE SKILLSCYBER SECURITY OPERATIONS The development of skills vital for collective Cyber defence, including Cyber security risk management,implementation and maintenance of security standards, Cyber security ethics and the law. Security Management course code QACISMPIT Security Fundamentals course code QASECFUND
PROTECTVULNERABILITY ASSESSMENT AND MANAGEMENTThe provision of techniques and tools to enable the assessment of systems for vulnerabilities that would enable compromise. Understanding Malware course code QAMALReverse Engineering Malware course code QAIREMAL
PENETRATION TESTING AND HACKING TECHIQUES The use of a penetration testing methodology which employs a range of tactics, techniques and procedures which tests and reports on the security of infrastructure, devices, applications and humans within your environment. Penetration Testing course code QAPENTESTThe Art of Hacking course code QATAOH
THIRD PARTY PROTECTION The management, maintenance and protection of third party platforms including public and private cloud and encryption services. Cloud Security course code QAOCSSecurity Implementation course code QAPKI
RESPONDINCIDENT RESPONSE AND HUNTINGThe tools and techniques for proactively identifying and responding to Advanced Persistent Threats. Detect, deter and defend. Threat Hunting course code QACYHUNTAttack & Defence course code QACYDEFSOC
DIGITAL FORENSIC INVESTIGATIONS A range of digital forensic techniques and cyber
investigation skills to enable digital forensic response to cyber incidents, enabling source and impact of cyber incidents to be found. Digital Forensics course code QAIDIGFORDigital Investigations course code QAIDIGINV CYBER SITUATIONAL AWARENESS The use of all sources of Cyber information to gain Cyber situational awareness enabling a more strategic response to the current and emerging Cyber threat environment through proactive threat hunting. Cyber Threats course code QACYTHREATCyber Crime course code QACYCRIME
DETECTINTRUSION DETECTION AND PREVENTIONThe tactics, techniques and procedures to collect, analyse, identify, prevent and respond to malicious activities on the network using full packet capture and logs. Network Security course code QACYNETSECWi-Fi Security course code QAWIFICYSEC
THREAT INTELLIGENCE The collection and analysis of open / closed source information to enhance our understanding of the digital world and to identify the sources of intelligence thatcan support our Cyber defence, response, management and penetration testing goals. Cyber Intelligence Intro course code QAOSCIICyber Intelligence Advanced course code QAOSCIA
SECURITY INFORMATION COLLECTION AND ANALYSIS The configuration and management of security event data from many system sources including end points and network security devices. The use of Security Information and Event Management (SIEM) correlation engines to analyse and identify realtime security related events. SOC Analyst course code QASOCFOU
QA’s Cyber Security experts have curated and developed many of the courses in The Complete Cyber Security AnalystTM series allowing individuals and organisations prevent and respond to
attacks through their gained expertise and knowledge of cyber defence including risk management, implementation and management of security standards, cyber security ethics and the law.