Course Description

CYBER 5W CERTIFIED THREAT ANALYST (CCTA) - Virtual Live Training

The CYBER 5W Certified Threat Analyst (CCTA) course is a specialized program designed to provide a comprehensive understanding of threat analysis in cybersecurity.

This on-demand course equips learners with the knowledge and practical skills required to identify, assess, and prioritize cyber threats effectively. Through a structured curriculum, participants will delve into key concepts, including attack methodologies, triaging processes, and security operations workflows.
The course incorporates real-world case studies and hands-on exercises to enhance critical thinking and decision-making skills in fast-paced environments.

Upon completion, learners will gain a strong foundation in threat analysis and earn the prestigious CCTA certification, showcasing their ability to excel in SOC roles or other cybersecurity-focused positions. Ideal for cybersecurity enthusiasts, SOC analysts, and IT professionals, this course offers the flexibility to fit your schedule and advance your career in today’s ever-changing cybersecurity landscape.

Training Delivery Details

Instructor Led Training

Live Training: 12 Days, April 7th - April 18th |3 hours / Day | Includes 24 hours of virtual lab access |Certification of Attendance

Sessions starts from 9 AM to 12 PM (Eastern Time) or scheduled upon a mutual agreement

Training fees: $2250

Syllabus

After completing this course, students will be able to demonstrate how to analyze malware, extract IOCs, and write a report about their analysis.

    Security Operation Center

  • Introduction
  • Log Sources
  • What is:
    • Threat Intelligence
    • Case Management
    • Mitre Attack
  • Building Your Own SOC
    • Elastic Search
    • Kibana
    • Collection Agents
    • EDR
  • ELK-Stack Navigation
  • Extending Logging Functionality
  • Threat Landscape and Attack Types
    • Overview of Cyber Attack Categories
    • Introduction to the MITRE ATT&CK Framework
    • Real-World Attack Campaigns Overview
  • Log Analysis and Event Correlation in SOC
    • Importance of Log Sources (Firewalls, Endpoint Devices, Network Logs)
    • Introduction to Event Correlation in SIEM
    • Understanding Key Log Fields for Different Attack Types
  • Phishing and Social Engineering Attacks
    • Analyzing Email Logs and Headers for Phishing Indicators
  • Brute Force Attacks
    • Analysis of Authentication Logs (Windows, Linux, Application)
    • Correlating Failed Login Attempts Across Different Log Sources
  • Web-Based Attacks
    • Detecting SQL Injection, Cross-Site Scripting (XSS), and Command Injection
    • Analyzing Web Server Logs for Suspicious Activity
  • Denial of Service (DoS) and Distributed Denial of Service (DDoS) Attacks
    • Detecting DoS and DDoS Attack Patterns in Network Logs
    • Recognizing High Traffic Spikes and Anomalous Behavior
    • Coordinating with Network Teams for DDoS Mitigation
  • Ransomware Detection and Initial Response
  • Privilege Escalation Attempts
    • Detecting Signs of Privilege Escalation in Logs
    • Responding to Suspected Privilege Escalation Attempts
  • Insider Threat Detection
  • Lateral Movement Detection
    • Identifying Lateral Movement Techniques
    • Network and Host Logs Correlation for Lateral Movement Detection
  • Command-and-Control (C2) Traffic Detection
  • Credential Theft and Replay Attacks
  • Responding to False Positives and Noise Management
  • Real-World Attack Case Studies

Instructor

Cyber 5W Team

Course Material

  • Slide Notes & Lab Documents

    Training material including the course slides, lab documents, and references for further reading.

  • Course Samples

    A copy of all the samples used during the training. Many of the samples have been custom built for the training.

  • Certificate of Attendance

    At the end of the course, you will receive a Certificate of Attendance that proves you have attended the course.

Learning Objectives

After completing this course, the student will be able to perform the following:

  • Investigate Real-World Attacks

  • Correlate Log Sources for Event Analysis

  • Detect and Mitigate Advanced Threats

  • Utilize Event Correlation in SIEM

  • Manage Insider Threats and Data Exfiltration

  • Establish Targeted Detection Rules

  • Optimize Alerting and Noise Management

  • Coordinate Comprehensive Incident Response

Prerequisites

  • Basic network understanding.
  • Ability to navigate computers freely.
  • The Value of the Training

    After completing this course, students will be able to demonstrate how to analyze malware, extract IOCs, and write a report about their analysis.

    Who is this Training For?

  • SOC analysts.

  • System admins who want to enhance their understanding of environment monitoring.

  • Detection engineers looking to understand more about the attacks they are defending against.
  • System Requirements:

    what you need to for the course

    1. Computer with 12+ RAM.

    2. Virtualization enabled on the machine.

    3. Internet access.

    Refund Policy:

    Refund requests for In-person and Online Virtual Training are accepted before the refund deadline and as long as the online course has not been accessed. To initiate a refund, please submit your request to [email protected]. The registration fee will be refunded, minus a $50 refund processing fee, to the original payment method. Please be advised that CYBER 5W OnDemand Courses are non-refundable and non-transferable once payment has been completed and course material has been accessed.