项目实训营
How to conduct incident response during cyber security attack By Paul Qiu | JR Tech Summit
play30:54

Cyber Security 实习+内推

Cyber Security 项目实训营

最简单快捷的实习经验, 拿网络安全Soc证书, 拿高薪网络安全offer

简单快速入门 Cyber Security,拿高薪 offer!

How to conduct incident response during cyber security attack By Paul Qiu | JR Tech Summit
play30:54
feature全面的课程知识体系
featureMentor1V1指导
feature获得本地实习经验
feature获得 Cyber Security 证书

课程大纲

    SOC Overview
    Comprehensive Overview of SOC

    Introduction to Cyber Security Operations Center (SOC)

    • Definition and Role of SOC in Cyber Security
    • SOC Functions: Detection, Analysis, Response, and Prevention
    • Importance of SOC in Today's Cyber Threat Landscape

    Understanding Cyber Ranges

    • Definition and Purpose of Cyber Ranges
    • Types of Cyber Ranges: Virtual, Physical, Cloud-based
    • Utilization of Cyber Ranges for Training, Testing, and Simulation

    Fundamentals of Cyber Security Architecture

    • Overview of Cyber Security Architecture
    • Key Components: Perimeter Defense, Endpoint Security, Network Security, Data Protection
    • Design Principles and Best Practices in Cyber Security Architecture

    SOC Tools and Technologies

    • Common Tools Used in SOC: SIEM (Security Information and Event Management), IDS/IPS (Intrusion Detection/Prevention System), EDR (Endpoint Detection and Response)
    • Introduction to Threat Intelligence Platforms
    • Emerging Technologies in SOC: AI, Machine Learning, Automation

    Knowledge Checks and Quizzes

    • Throughout the Module, Knowledge Checks will be provided to reinforce understanding.
    • A comprehensive Quiz will be held at the end of the Module to assess the learner's comprehension of the topics covered.
    Cyber Landing Cyber Range Video Guided Demonstration

    Complete Cyber Landing’s cyber range video guided demonstration.

    Practice LAB 1.0.

    Practice LAB 1.0. Experience Cyber Landing’s military-grade cyber range.

    Practice LAB 2.0.

    Practice LAB 2.0. Experience Cyber Landing’s military-grade cyber range.

    Feedback

    Your feedback keeps us on our toes. We want you to get your dream job in a world-class SOC.

    SOC Analyst I
    SIEM e-Learning

    SIEM e-Learning presentation with knowledge checks throughout and a quiz at the end.

    SIEM Lab

    Practice SIEM Lab 1, 2 & 3.

    Firewall e-Learning

    Firewall e-Learning presentation with knowledge checks throughout and a quiz at the end.

    Firewall Lab

    Firewall Lab:

    1. Sun Flood Attack
    2. DDoS
    3. Packet Capture
    IPS e-Learning

    IPS e-Learning presentation with knowledge checks throughout and a quiz at the end.

    IPS Lab

    IPS Lab:

    1. Login Brute Force Attack
    2. External ScaN Reconnaissance
    3. Detect Wannacry Attack
    4. Mobile Malware Attack
    Web Security e-Learning

    Web Security e-Learning presentation with knowledge checks throughout and a quiz at the end.

    Web Security Lab

    Web Security Lab:

    1. Malware Detection
    2. Reputation Based Detection
    3. HTTP Response Codes.
    Email Security e-Learning

    Email Security e-Learning presentation with knowledge checks throughout and a quiz at the end.

    Email Security Lab

    Email Security Lab:

    1. Malware Detection
    2. Spam Detection
    3. Illegal Content Detection.
    SOC Analyst I feedback

    Your feedback keeps us on our toes. We want you to get your dream job in a world-class SOC.

    e-Learning Forum

    Optional e-Learning Forum.

    SOC Analyst II
    Identity e-Learning

    Identity e-Learning presentation with knowledge checks throughout and a quiz at the end.

    Identity Lab

    Identity Lab:

    1. Brute Force
    2. Credential Stuffing
    3. Privilege Escalation
    NetFlow e-Learning

    NetFlow e-Learning presentation with knowledge checks throughout and a quiz at the end.

    NetFlow Lab

    NetFlow Lab:

    1. C&C
    2. External Scan Reconnaissance
    3. DLP
    WAF e-Learning

    WAF e-Learning presentation with knowledge checks throughout and a quiz at the end.

    WAF Lab

    WAF Lab:

    1. SQL Injection
    2. Cross Site Scripting.
    Threat Intelligence e-Learning

    Threat Intelligence e-Learning presentation with knowledge checks throughout and a quiz at the end.

    Threat Intelligence Lab

    Threat Intelligence Lab:

    1. IP Reputation
    2. Domain Reputation
    3. Hash Reputation.
    Incident Response e-Learning

    Incident Response e-Learning presentation with knowledge checks throughout and a quiz at the end.

    Incident Response Lab

    Practice Incident Response Lab 1, 2 & 3.

    SOC Analyst II Feedback

    Your feedback keeps us on our toes. We want you to get your dream job in a world-class SOC.

    e-Learning Forum

    Optional e-Learning Forum.

    Mentoring
    Mentoring Program

    To get into the Mentoring program it is highly recommended that you successfully complete the SOC Analyst II Certificate and contact us to apply. This is an intense, one-on-one, 8-hour program over 8-weeks, designed to get you your dream job:

    1. Understanding your work and technical background
    2. Choose your cyber security career path
    3. Discover the most suitable roles to apply for
    4. Initial CV and LinkedIn Review with followup
    5. Technical & behaviour interview preparation and guidance
    6. Technical interview simulation
    7. Behaviour interview simulation
    8. Interview feedback plus review and guidance in salary negotiation
    Internship
    Internship Program

    To get into the Internship program it is highly recommended that you successfully enroll in the Mentoring Program. This is an intense, 1-Month program, designed to give you the work experience you need:

    You will:

    1. Monitor a company’s SOC
    2. Do Incident Response
    3. Fine tune false positives
    4. Fixing defects in thr SOCdrills platform
logo

Follow Us

linkedinfacebooktwitterinstagramweiboyoutubebilibilitiktokxigua

We Accept

/image/layout/pay-paypal.png/image/layout/pay-visa.png/image/layout/pay-master-card.png/image/layout/pay-stripe.png/image/layout/pay-alipay.png

地址

Level 10b, 144 Edward Street, Brisbane CBD(Headquarter)
Level 8, 11 York st, Wynyard, Sydney CBD
Business Hub, 155 Waymouth St, Adelaide SA 5000

Disclaimer

footer-disclaimerfooter-disclaimer

JR Academy acknowledges Traditional Owners of Country throughout Australia and recognises the continuing connection to lands, waters and communities. We pay our respect to Aboriginal and Torres Strait Islander cultures; and to Elders past and present. Aboriginal and Torres Strait Islander peoples should be aware that this website may contain images or names of people who have since passed away.

匠人学院网站上的所有内容,包括课程材料、徽标和匠人学院网站上提供的信息,均受澳大利亚政府知识产权法的保护。严禁未经授权使用、销售、分发、复制或修改。违规行为可能会导致法律诉讼。通过访问我们的网站,您同意尊重我们的知识产权。 JR Academy Pty Ltd 保留所有权利,包括专利、商标和版权。任何侵权行为都将受到法律追究。查看用户协议

© 2017-2024 JR Academy Pty Ltd. All rights reserved.

ABN 26621887572