Learn how to proactively protect an organization against cyber threats in this five-day advanced hands-on training. You will learn to set up, deploy and integrate analysis tools, intrusion detection systems, syslog servers and SIEM solutions to monitor, detect and mitigate threats in real time. With Cyber Range Labs, you will work in a realistic environment to build a complete end-to-end security monitoring solution.
Prepares for this certification
This training prepares you for the official C)CSA certification from Mile2. The exam consists of 100 multiple-choice questions, takes approximately 2 hours and is taken online through the Mile2 Learning Management System. A minimum score of 70% is required to pass. The exam voucher is included with this training, along with a free second attempt (free retake) should you not pass on the first try.
This course is also excellent preparation for this industry certification:
The Certified Cybersecurity Analyst (C)CSA) is one of the most advanced training courses in the Mile2 portfolio, positioned at the highest level (400) of the certification roadmap. This course is considerably more advanced than you might expect: the pace is fast and the content runs deep. You will dive into the details of security analysis for today’s challenges.
Upon completion, you will be able to set up and deploy state-of-the-art open source and commercial analysis tools, intrusion detection tools, syslog servers and SIEM systems. You will learn to integrate these tools into a cohesive whole that protects the entire organization. The training combines data from various cyber defense tools such as IDS alerts, firewalls and network traffic logs to analyze events and mitigate threats.
The C)CSA focuses on analyst work within a Security Operations Center (SOC) and is designed for professionals who already have experience with security principles, forensics, incident handling or ethical hacking. The training builds on this knowledge and teaches you how to prepare an organization for proactive defense against today’s attackers.
Learning Objectives
Upon completion of this training, you will be able to:
Set up and deploy open source and commercial security analysis tools
Configure and manage intrusion detection and prevention systems
Set up syslog servers for centralized log collection
Implement and integrate SIEM solutions across the entire organization
Analyze data from IDS alerts, firewalls and network traffic logs to identify threats
Build a complete end-to-end solution for proactively monitoring, detecting and mitigating threats
Produce reports and recommendations to strengthen the organization’s detection and defense capabilities
Prerequisites
The following prior knowledge is recommended (one or more of the following courses or equivalent experience):
Not satisfied? You will get your money back without questions, without explanation. We want you to be always satisfied. Read more about money back guarantee.
Always certification guarantee via LAI CertProtect
If an employee leaves your organization within 6 months of a training, you can register another employee for the same training free of charge. This way you protect your investment! Read more about LAI CertProtect.
Always the best teachers
LAI has experienced and certified teachers who understand the art of explaining difficult topics in a fun and understandable way. Our teachers are still active in the professional field as consultants on a daily basis.
Always comprehensive advice
Courses and certifications can be complicated. Let our certification experts create a training program for your employees free of charge.
What our students tell us:
{
Excellent trainer and training center, everyone's very nice and kind and perfect professionals!
5
Tihomir Shirov
CNSys PLC
{
Wonderful treatment, kind hosts and the perfect place to gain knowledge.
5
Boyko Kolev
CNSys PLC
{
Very good instructor, which made the training very clear and helpful for me experiencing Aruba Networks
5
Bram van Dongen
Network Engineer
Axians
{
The training was excellent, offering a lot of hands-on labs, though time was a bit tight—but that's expected in an expert-level course. The location was also fantastic, with a great environment, high-quality equipment, and friendly people.
5
Arne van der Meulen
Senior Network Engineer
Axians
{
Have taken multiple trainings. LAI gives a trusted and personal feeling!
5
Brain Reynders
Senior Network Consultant
Prowise
{
Very positive, I approached it with an open mindset and was able to gain a lot of new knowledge that I didn't yet possess about macOS and other Apple Services. Very friendly and knowledgeable trainer, always with a clear answer to questions. Overall very satisfied with this training!
5
Anthony Schepers
Prowise
{
The LAI crew is very helpful, and Peter is an excellent trainer.
Peter is enthusiastic about the topic, not only while teaching but also when he gets questions in labs. It's truly rare to see such a combination.
Makes it fun to learn.
Will definitely come back if I get the chance.
5
Even Myrvold
Network Consultant
Netnordic
{
One of the best trainings I ever had - If not the best! Hans did a really good job at presenting everything in a timely fashion. Really enjoyed it! Can´t recommend any suggestions for improvements, Hans and the LAI Team did a really good job!
Very good training and highly recommended, good handout material.
5
Harry Willemsen
Senior Technical Consultant
Ingram Micro
LAI in numbers
30.000+
students
9.8
customer satisfaction
100%
money back guaranteed
1987
more than 35 years of experience
Questions about this course
If you have any questions about this training, please contact us via [email protected], +31 10 2042220 or via the “get in touch” form below. After we have processed your registration, you will receive a registration confirmation and an invoice that can be paid by bank transfer or credit card.