25.8.2
This website uses cookies to ensure you get the best experience on our website. Learn more

Continuous Security Validation Pro with Cymulate Micro-badge

Program Summary
These two courses provide the fundamental understanding and practice of building an effective offensive strategy within an enterprise. Continuous security validation is a consistent and rigorous process that scans for weaknesses that could potentially be exploited by malicious actors. It’s a persistent, offensive method that approaches attack surface, security controls, and lateral movement paths from an attackers’ standpoint, using many of the same tactics to find vulnerabilities and escalation routes. 

Outcomes/Objectives

Upon completion students will be understand:

  • Attacks And Exploits

  • Blue Team, Red Team, and Purple Team Skills

  • Cyber Incident Analysis and Response

  • Cyber Intelligence

  • Enterprise Security Operations

  • IOC Analysis

  • Offensive Cybersecurity

Deliverable

  • Complete the two courses

    • Building an Effective Offensive Security Program

    • Understanding Offensive Security Hands-On

Program Duration

1 hour

Skills / Knowledge

  • Computer Network Defense
  • Vulnerabilities Assessment
  • Threat Analysis
  • Incident Management
  • Information Systems/Network Security
  • Data Privacy and Protection
  • External Awareness
  • Risk Management