A.C.E. - Defender Series
Duration: 8 Days
Range Hours: 40
The Applied Cybersecurity Essentials (A.C.E.) Defender series allows learners to completely build defensive security operation skills as they navigate through a variety of blue team scenarios. Learn SOC operations, the kill chain, and incident response frameworks while working through real attacks.
Security Operations 1
Learn security operations and defensive security fundamentals in our introductory SOC1 badge. Topics include defending Windows and Linux web servers. Learn the basics of Windows, Linux, and network forensics. Key concepts and tools include commercial SIEM, firewalls, and systems monitoring. Learners will also interact with packet capture tools and open source IDS.
Security Operations 2
Continue learning key defensive security concepts while working through three increasingly difficult scenarios. Concepts include Linux and Windows log management, scripting, packet sniffing, and more. Key concepts and tools include commercials SIEMs and firewalls, and other investigation tools.
Security Operations 3
Continue learning key defensive security concepts while working through three "hard" scenarios. Concepts include Linux log management, Windows and Linux forensics, and MS SQL technologies. Key concepts and tools include commercials SIEMs and firewalls, common mail server applications, packet capture tools, etc.
Security Operations 4
Finish key learning objectives of defensive security concepts while working through three scenarios. Concepts include advanced Linux and Windows forensics and logging, reverse engineering techniques, and more. Key concepts and tools include commercials SIEMs and firewalls, and other investigation tools.
Are you ready for Defender?
The Applied Cybersecurity Essentials - Defender series is made up of team-based learning scenarios and geared toward experienced cybersecurity professionals. We recommend taking the Defender Readiness Survey to gauge your level of preparedness for succeeding in the series. These results will not prevent participation but provide direction for your cybersecurity education.
Need more information?
Complete the form below and we will reach out with more information.