Course Description
CYBER 5W CERTIFIED THREAT ANALYST (CCTA) - Virtual Live Training
The CYBER 5W Certified Threat Analyst (CCTA) course is a specialized program designed to provide a comprehensive understanding of threat analysis in cybersecurity.
This on-demand course equips learners with the knowledge and practical skills required to identify, assess, and prioritize cyber threats effectively.
Through a structured curriculum, participants will delve into key concepts, including attack methodologies, triaging processes, and security operations workflows.
The course incorporates real-world case studies and hands-on exercises to enhance critical thinking and decision-making skills in fast-paced environments.
Upon completion, learners will gain a strong foundation in threat analysis and earn the prestigious CCTA certification, showcasing their ability to excel in SOC roles or other cybersecurity-focused positions.
Ideal for cybersecurity enthusiasts, SOC analysts, and IT professionals, this course offers the flexibility to fit your schedule and advance your career in today’s ever-changing cybersecurity landscape.
Training Delivery Details
Instructor Led Training
Live Training: 12 Days, April 7th - April 18th |3 hours / Day | Includes 24 hours of virtual lab access |Certification of Attendance
Sessions starts from 9 AM to 12 PM (Eastern Time) or scheduled upon a mutual agreement
Training fees: $2250
Syllabus
After completing this course, students will be able to demonstrate how to analyze malware, extract IOCs, and write a report about their analysis.
- Introduction
- Log Sources
- What is:
- Threat Intelligence
- Case Management
- Mitre Attack
- Building Your Own SOC
- Elastic Search
- Kibana
- Collection Agents
- EDR
- ELK-Stack Navigation
- Extending Logging Functionality
- Threat Landscape and Attack Types
- Overview of Cyber Attack Categories
- Introduction to the MITRE ATT&CK Framework
- Real-World Attack Campaigns Overview
- Log Analysis and Event Correlation in SOC
- Importance of Log Sources (Firewalls, Endpoint Devices, Network Logs)
- Introduction to Event Correlation in SIEM
- Understanding Key Log Fields for Different Attack Types
- Phishing and Social Engineering Attacks
- Analyzing Email Logs and Headers for Phishing Indicators
- Brute Force Attacks
- Analysis of Authentication Logs (Windows, Linux, Application)
- Correlating Failed Login Attempts Across Different Log Sources
- Web-Based Attacks
- Detecting SQL Injection, Cross-Site Scripting (XSS), and Command Injection
- Analyzing Web Server Logs for Suspicious Activity
- Denial of Service (DoS) and Distributed Denial of Service (DDoS) Attacks
- Detecting DoS and DDoS Attack Patterns in Network Logs
- Recognizing High Traffic Spikes and Anomalous Behavior
- Coordinating with Network Teams for DDoS Mitigation
- Ransomware Detection and Initial Response
- Privilege Escalation Attempts
- Detecting Signs of Privilege Escalation in Logs
- Responding to Suspected Privilege Escalation Attempts
- Insider Threat Detection
- Lateral Movement Detection
- Identifying Lateral Movement Techniques
- Network and Host Logs Correlation for Lateral Movement Detection
- Command-and-Control (C2) Traffic Detection
- Credential Theft and Replay Attacks
- Responding to False Positives and Noise Management
- Real-World Attack Case Studies
Security Operation Center
Instructor
Cyber 5W Team
Learning Objectives
After completing this course, the student will be able to perform the following:
-
Investigate Real-World Attacks
-
Correlate Log Sources for Event Analysis
-
Detect and Mitigate Advanced Threats
-
Utilize Event Correlation in SIEM
-
Manage Insider Threats and Data Exfiltration
-
Establish Targeted Detection Rules
-
Optimize Alerting and Noise Management
-
Coordinate Comprehensive Incident Response
Prerequisites
The Value of the Training
Who is this Training For?
System Requirements:
what you need to for the course
2. Virtualization enabled on the machine.
3. Internet access.