وب سایت تخصصی شرکت فرین
دسته بندی دوره ها

Misconfigurations Defense for Red and Blue Teams

سرفصل های دوره

Misconfigurations Defense for Red and Blue Teams as well as GRC Professionals


1. SECTION 1
  • 1. Introduction
  • 2. Course Agenda
  • 3. Intro to Systemic weaknesses in relation to cybersecurity misconfigurations
  • 4. Intro to the top 10 NSA & CISA Misconfigurations
  • 5. Misconfiguration #1
  • 6. Misconfiguration #2
  • 7. Misconfiguration #3
  • 8. Misconfiguration #4
  • 9. Misconfiguration #5
  • 10. Misconfiguration #6
  • 11. Misconfiguration #7
  • 12. Misconfiguration #8
  • 13. Misconfiguration #9
  • 14. Misconfiguration #10
  • 15. End of Section 1 Quiz

  • 2. SECTION 2-Misconfigurations Mitigation Recommendations
  • 1. An Intro to MITRE ATT&CK Framework
  • 2. Mitigate-Default configurations of software and applications
  • 3. Mitigate-Improper separation of useradministrator privilege
  • 4. Mitigate-Insufficient internal network monitoring
  • 5. Mitigate-Lack of network segmentation
  • 6. Mitigate-Poor patch management
  • 7. Mitigate-Bypass of system access controls
  • 8. Mitigate-Weak or misconfigured multifactor authentication (MFA) methods
  • 9. Mitigate-Insufficient access control lists (ACLs) on network shares and services
  • 10. Mitigate-Poor credential hygiene
  • 11. Mitigate- Unrestricted code execution
  • 12. Validating Security Controls
  • 13. Open-Source Tools for Testing Active Directory Misconfigurations
  • 14. Intro to Open-Source Tools for addressing the top 10 misconfigurations
  • 15. Open-Source Tools for Preventing Insufficient Access Control Lists (ACLs) on Net
  • 16. Open-Source Tools for Preventing Lack of Network Segmentation
  • 17. Open-Source Tools for Preventing Insufficient Internal Network Monitoring
  • 18. Establishing security baselines to help with mitigating misconfigurations
  • 19. Lab#1- Creating Security Baselines In Azure
  • 20. Lab#2- PenTest Azure Deployments Misconfigurations using ChatGPT
  • 21. Lab#3- PenTest Azure Deployments Misconfigurations using ChatGPT
  • 22. Lab#4-Misconfigurations Research Defense Challenge

  • 3. SECTION 3-Putting everything into perspective
  • 1. Introduction to Section 3
  • 2. Intro to Root Cause Analysis (RCA)
  • 3. Benefits of RCA for both Red and Blue Teamers
  • 4. Steps for conducting RCA
  • 5. Quiz#2
  • 6. Intro to creating misconfigurations mitigation checklists using AI
  • 7. Creating a misconfiguration prevention checklist
  • 8. Creating a misconfiguration checklist that prevents bypass of system access cont
  • 9. Challenge-Create Your own misconfigurations checklist
  • 10. Case Scenario- Applying Misconfigurations Checklist to a Data Breach Incident
  • 11. Improving Hardening of environment against these misconfigurations
  • 12. Prevent cloud security misconfigurations via Azure Red Team Pen Testing
  • 13. End of Course

  • 4. Course Resources
  • 1.1 Case Scenario-The Breach of Acme Inc.pdf
  • 1.2 JOINT CSA TOP TEN MISCONFIGURATIONS TLP-CLEAR.PDF
  • 1.3 Links to websites.txt
  • 1.4 Steps Involved in Root Cause Analysis.pdf
  • 1. Bonus Lecture.html
  • 139,000 تومان
    بیش از یک محصول به صورت دانلودی میخواهید؟ محصول را به سبد خرید اضافه کنید.
    خرید دانلودی فوری

    در این روش نیاز به افزودن محصول به سبد خرید و تکمیل اطلاعات نیست و شما پس از وارد کردن ایمیل خود و طی کردن مراحل پرداخت لینک های دریافت محصولات را در ایمیل خود دریافت خواهید کرد.

    ایمیل شما:
    تولید کننده:
    مدرس:
    شناسه: 37433
    حجم: 2705 مگابایت
    مدت زمان: 260 دقیقه
    تاریخ انتشار: 20 خرداد 1403
    دسته بندی محصول
    دیگر آموزش های این مدرس
    طراحی سایت و خدمات سئو

    139,000 تومان
    افزودن به سبد خرید