Certcop – A division of Secbay Inc.
We combine the latest Cyber tools with original in-house designs to develop customized and advanced Cyber Security programs to meet the client’s requirements. CertCop offers training programs in the area of Pen testing using Kali Linux, Cyber Security Management, Incident Handling & Disaster Recovery, Application Security, Secure Coding, and customized SOC training programs according to client requirements.
- Certified and Highly Experienced Instructors
- Delivery Methods:
Virtual live / In-Class /On-site /1 on 1/ On-Demand - Certcop Flexible Scheduling (Day / Evening / Weekends)
- Certcop High Quality, Extensive and Industry Standard Curriculum
Certified Cybercop Blue Team – Defensive Security
The Certified Cybercop Blue Team program is designed to teach and evaluate real defensive security abilities across a wide variety of blue-team disciplines, making it ideal for newcomers to the sector as well as seasoned security professionals.
Target Audience
- Security/Network Defender
- IT Employs
- Security enthusiasts
- Students
- Entry-level Cybersecurity Position
Pre Requirements
This course requires a basic familiarity with TCP/IP and operating system principles. It’s a plus if you’re familiar with the Linux command line, network security monitoring, and SIEM technologies. Some fundamental security concepts are expected at this level.
Exam Details:
- Required exam—- Certified Cybercop Blue Team
- Number of questions—- Maximum of 90
- Types of questions—- Multiple-choice and performance-based
- Length of test—- 180 minutes
- Passing score—- 70%
Course Content
- CHAPTER 1 Blue Team Methodology
- CHAPTER 2 Recruiting Blue Team Members
- CHAPTER 3 Inro to Linux
- CHAPTER 4 Setting Localization Options
- CHAPTER 5 Sifting through Services
- CHAPTER 6 Package Management and Repositories
- CHAPTER 7 Kali Linux Bash Scripting
- CHAPTER 8 Linux Firewalls
- CHAPTER 9 Identity and Access (IAM)
- CHAPTER 10 Vulnerability Scanning
- CHAPTER 11 Threat and Vulnerability Management
- CHAPTER 12 Security Information and Event Management (SIEM)
- CHAPTER 13 Incident Response Toolkit/Process
- CHAPTER 14 Digital Forensics
- CHAPTER 15 SOAR – Security Orchestration Automation Response
- CHAPTER 16 Policies to Mitigate Risk
- CHAPTER 17 Software and Systems Security
- CHAPTER 18 Software Development Life Cycle (SDLC)
- CHAPTER 19 Mobile Device Hacking
- CHAPTER 20 Cryptography and PKI
Course Features
- Lectures 30
- Quizzes 0
- Duration 18.5 hours
- Skill level All levels
- Language English
- Students 275
- Certificate Yes
- Assessments Yes
Curriculum
- 2 Sections
- 30 Lessons
- 365 Days
- Certified Cybercop Blue Team - Defensive Security24
- 1.1Package Management and Repositories38 Minutes
- 1.2Incident Response Toolkit/Process31 Minutes
- 1.3Policies to Mitigate Risk19 Minutes
- 1.4Software Development Lifecycle (SDLC)34 Minutes
- 1.5Security Information Event Management28 Minutes
- 1.6Blue Team Introduction33 Minutes
- 1.7Blue Team Methodology44 Minutes
- 1.8Cryptography and PKI30 Minutes
- 1.9Digital Forensics35 Minutes
- 1.10Kali Linux Bash Scripting27 Minutes
- 1.11Mobile Device Hacking 167 Minutes
- 1.12Mobile Device Hacking 29 Minutes
- 1.13Recruiting Blue Team Members20 Minutes
- 1.14Threat and Vulnerability Management36 Minutes
- 1.15Vulnerability Scanning Part-116 Minutes
- 1.16Vulnerability Scanning Part-226 Minutes
- 1.17Sifting through services.83 Minutes
- 1.18Security Orchestration, Automation, and Response (SOAR)40 Minutes
- 1.19Linux Firewalls39 Minutes
- 1.20Setting Localization Options20 Minutes
- 1.21Introduction to Linux52 Minutes
- 1.22Software and Systems Security65 Minutes
- 1.23ChatGPT17 Minutes
- 1.24Blue Team Case Study45 Minutes
- Certified Cybercop Blue Team - Defensive Security - LABS6