Module 1: UNDERSTANDING VULNERABILITY RESPONSE, HANDLING, AND MANAGEMENT
- 		Understanding Cybersecurity Leadership Concepts
- 		Exploring Control Types and Methods
- 		Explaining Patch Management Concepts
	 
	Module 2: EXPLORING THREAT INTELLIGENCE AND THREAT HUNTING CONCEPTS
- 		Exploring Threat Actor Concepts
- 		Identifying Active Threats
- 		Exploring Threat-Hunting Concepts
	 
	Module 3: EXPLAINING IMPORTANT SYSTEM AND NETWORK ARCHITECTURE CONCEPTS
- 		Reviewing System and Network Architecture Concepts
- 		Exploring Identity and Access Management (IAM)
- 		Maintaining Operational Visibility
	 
	Module 4: UNDERSTANDING PROCESS IMPROVEMENT IN SECURITY OPERATIONS
- 		Exploring Leadership in Security Operations
- 		Understanding Technology for Security Operations
	 
	Module 5: IMPLEMENTING VULNERABILITY SCANNING METHODS
- 		Explaining Compliance Requirements
- 		Understanding Vulnerability Scanning Methods
- 		Exploring Special Considerations in Vulnerability Scanning
	 
	Module 6: PERFORMING VULNERABILITY ANALYSIS
- 		Understanding Vulnerability Scoring Concepts
- 		Exploring Vulnerability Context Considerations
	 
	Module 7: COMMUNICATING VULNERABILITY INFORMATION
- 		Explaining Effective Communication Concepts
- 		Understanding Vulnerability Reporting Outcomes and Action Plans
	 
	Module 8: EXPLAINING INCIDENT RESPONSE ACTIVITIES
- 		Exploring Incident Response Planning
- 		Performing Incident Response Activities
	 
	Module 9: DEMONSTRATING INCIDENT RESPONSE COMMUNICATION
- 		Understanding Incident Response Communication
- 		Analysing Incident Response Activities
	 
	Module 10: APPLYING TOOLS TO IDENTIFY MALICIOUS ACTIVITY
- 		Identifying Malicious Activity
- 		Explaining Attack Methodology Frameworks
- 		Explaining Techniques for Identifying Malicious Activity
	 
	Module 11: ANALYSING POTENTIALLY MALICIOUS ACTIVITY
- 		Exploring Network Attack Indicators
- 		Exploring Host Attack Indicators
- 		Exploring Vulnerability Assessment Tools
	 
	Module 12: UNDERSTANDING APPLICATION VULNERABILITY ASSESSMENT
- 		Analysing Web Vulnerabilities
- 		Analysing Cloud Vulnerabilities
	 
	Module 13: EXPLORING SCRIPTING TOOLS AND ANALYSIS CONCEPTS
- 		Understanding Scripting Languages
- 		Identifying Malicious Activity Through Analysis
	 
	Module 14: UNDERSTANDING APPLICATION SECURITY AND ATTACK MITIGATION BEST PRACTICES
- 		Exploring Secure Software Development Practices
- 		Recommending Controls to Mitigate Successful Application Attacks
- 		Implementing Controls to Prevent Attacks
	 
	 
							 
                             
                            
KoçSistem Bilgi ve İletişim Hizmetleri A.Ş
Hiçbir şikayetim yok. Eğitmenimiz bilgi birikimi bakımından çok donanımlıydı ve bizlere çok iyi fikirler bilgiler verdi. Kullandığı dokümanlar da çok bilgili ve detaylıydı. Teşekkür ediyorum.
KoçSistem Bilgi ve İletişim Hizmetleri A.Ş
Çok memnum kaldım, çok sağ olun.
KoçSistem Bilgi ve İletişim Hizmetleri A.Ş
Eğitim çok kaliteliydi. Bundan sonra şahsi olarak eğitim almak istersem uğrayacağım ilk yer olur.
KoçSistem Bilgi ve İletişim Hizmetleri A.Ş
Eğitimi 5 yıldız olarak puanladı.
KoçSistem Bilgi ve İletişim Hizmetleri A.Ş
Eğitimi 5 yıldız olarak puanladı.
KoçSistem Bilgi ve İletişim Hizmetleri A.Ş
Eğitimi 5 yıldız olarak puanladı.