Advanced Defender 402: Team Based Security Operations
- Duration: 16 hours
- Delivery Options: Online, In-person, Hybrid
Continue learning key defensive security concepts, including Linux and Windows log management, scripting, packet sniffing, and more. Key concepts and tools include commercials SIEMs and firewalls, and other investigation tools.
Who should take this course
AD-402 is designed for cyber and information security professionals interested in challenging their skills. It is recommended that participants have at least three to five years of cybersecurity experience or completed the DEF series.
How can you take this course
Available online live with an instructor
Available in-person either at Purdue or at your location.
Available as a combination of online and in-person
What tools you will use
Participants will use industry tools such as Active Directory, QRadar, Palo Alto Firewalls, Zennos, SysInternals, McAfee EPO, and more.
What you can expect from Advanced Defender 402: Team Based Security Operations
AD-402 builds on the defensive cyber skills and concepts taught in the ACE-DEF series. Participants will face three advanced cyberattack scenarios from which they will need to be able to identify, mitigate, and recover. The range instructor will provide a debrief with full details on the cyberattacks and additional techniques on how to respond.
- Upskill current workforce
- Get hands-on with industry tools in virtual labs.
- Perfect for I.T. leaders
- Gain an understanding of network traffic.
- Learn industry tools in virtual labs.
- Taught remotely or in-person
AD-401 is designed for cybersecurity teams and requires a level of teamwork and corporation to complete. The course is taught through three Purdue Cyber Range scenarios with a debriefing by a range instructor over the course of two days.
Purdue Cyber Range is a virtual testing ground that allows individuals and teams to experience both defensive and offensive cyberattack scenarios. Each scenario is overseen by a Range Master, ensuring your team's experience is as educational as possible.
Advanced Defensive Practices: Understand the role of teamwork in a defensive cyber scenario along with advanced security tactics such as lateral network movement and data exfiltration.
Incident Response: Understand advanced methods of identifying, containing, and recovering from a cyber attack within a network.
Adversarial Thinking: Learn how to better identify malware and bad actors by understanding antagonistic thinking.
It is recommended that all of cyberTAP courses be taken on a laptop or PC that runs either Windows or Linux as an operating system. We also recommended to have a fast and reliable internet access.