Continuous Security Validation Pro with Cymulate Micro-badge
Program Summary
These two courses provide the fundamental understanding and practice of building an effective offensive strategy within an enterprise. Continuous security validation is a consistent and rigorous process that scans for weaknesses that could potentially be exploited by malicious actors. It’s a persistent, offensive method that approaches attack surface, security controls, and lateral movement paths from an attackers’ standpoint, using many of the same tactics to find vulnerabilities and escalation routes.
Outcomes/Objectives
Upon completion students will be understand:
Attacks And Exploits
Blue Team, Red Team, and Purple Team Skills
Cyber Incident Analysis and Response
Cyber Intelligence
Enterprise Security Operations
IOC Analysis
Offensive Cybersecurity
Deliverable
Complete the two courses
Building an Effective Offensive Security Program
Understanding Offensive Security Hands-On
Program Duration
1 hour
Skills / Knowledge
- Computer Network Defense
- Vulnerabilities Assessment
- Threat Analysis
- Incident Management
- Information Systems/Network Security
- Data Privacy and Protection
- External Awareness
- Risk Management