Operation Chimera Elite: Defensive Operation

Current Status
Not Enrolled
Price
15
Get Started
This course is currently closed

 By purchasing any of Security Blue Team’s courses, you acknowledge that you have read and agree to the Refunds Policy (https://securityblue.team/refunds-policy)

What Will I Learn?

We have combined a number of hands-on exercises along with written challenges, all aimed at developing experience that will be useful when applying for a security role, or expanding on existing skills. If you complete all 10 modules with a score of 70% or higher, you’ll earn a free Certificate of Completion to showcase your skills.

PHISHING ANALYSIS

This is by far the most common attack vector, and learning how to properly analyze and respond to phishing campaigns is a crucial day-to-day skill within a Security Operations role.

NETWORK ANALYSIS

Knowing how systems communicate is essential. By understanding how devices talk, you can determine what is expected activity, and what is not.

OPEN-SOURCE INTELLIGENCE

OSINT is great for keeping up-to-date with the latest security news, trends, and information. This intelligence can also be utilized to conduct defensive monitoring, and threat intelligence.

DIGITAL FORENSICS

Forensics is crucical to defeat cyber threats, and monitor malicious insiders. By taking a deep look at systems, you can discover even the smallest details.

VULNERABILITY MANAGEMENT

Scanning for vulnerabilities and fixing them before attacks have a chance to exploit them reduced public exposure and risk from cyber attacks. You’ll learn how to scan, analyse, and patch vulnerabilities.

INCIDENT RESPONSE

Responding to security incidents in an organised and structured way is important, ensuring everything is handled in the right way, by the right people. You’ll take lead of a scenario, and take steps to resolve the incident.

PHYSICAL SECURITY

Ensuring malicious actors can’t get physical access to computer systems is key, as this usually means Game Over. You’ll learn about the different types of physical security, and where they’re used.

THREAT INTELLIGENCE

Tracking Threat Actors and implementing defences before they’re able to strike is important to protect IT assets. You’ll learn all about information sharing, indiciators of compromise, and tactical threat intelligence.

INTRUSION DETECTION SYSTEMS

IDS works alongside IPS and Analysts to defend against cyber threats and stop them as they happen. You’ll learn about Rules, and how they keep IDS running.

SECURITY INFORMATION AND EVENT MONITORING

The SIEM collects raw data, and correlates it into security events. Analysts will respond to these, and start investigations. You’ll learn what SIEM is, and how to handle security events.

Individuals that have earned a Chimera Certificate of Completion have passed all 10 modules with a score of 70% or higher. They have proven their knowledge and skills in a combination of theoretical, situational, and practical hands-on challenges which are graded by our team.

Applications to apply for a certificate will open once Chimera ends for the public on the 30th of November. If approved, you will receive your certificate by email, and it will have no expiry date.