itsMe Posted July 16, 2023 Share Posted July 16, 2023 This is the hidden content, please Sign In or Sign Up Why Our Training? The training course and certification exam were created under the supervision of our Academic Advisory Board, comprised of Senior Security Analysts, SOC Managers, and other senior security roles; ensuring it is accurate, realistic, and applicable to modern security operations. We have proven that our training can help change lives. Our students have broken into industry or secured promotions as a result of taking our certifications. We have developed the skills of entire security teams and forged stronger technical defenders. Don’t believe us? Believe them! Read our BTL1 success stories at the link below. Who is the course for? BTL1 is designed to train technical defenders that are capable of defending networks and responding to cyber incidents. Below are some examples of the skills and experience you will gain. Analysing and responding to phishing attacks Performing forensics investigations to collect and analyse digital evidence Using a SIEM platform to investigate malicious activity Log and network traffic analysis including malware infections Conducting threat actor research and much more! The skills and tools you’ll learn in this course will be directly applicable to a range of security roles, and are actively used by defenders around the world. WHY CHOOSE BTL1? BTL1 is perfect for security enthusiasts or professionals that want to develop their practical defensive cyber skills. Roles that we believe would benefit from this course include: Students/IT Personnel Security Analysts Incident Responders Threat Intelligence Analysts Forensics Analysts Whilst our content is aimed primarily at entry-level or junior roles, read our course syllabus to see if BTL1 is the right choice for you or your team! BTL1 meets 60% of the 125 requirements under the NICE Cyber Defense Analyst framework, including 67% of knowledge and 67% of ability. Tools covered Autopsy, Browser History Capturer, Browser History Viewer, DeepBlueCLI, DomainTools, Event Viewer, FTK Imager, JumpList Explorer, KAPE, Linux CLI, MISP, OpenCTI, PECmd, PhishTool, PowerShell, ProcDump, Scalpel, Sigma, Snort, Splunk, Suricata, TheHive5, URL2PNG, VirusTotal, Volatility, WannaBrowser, Windows File Analyzer, Wireshark This is the hidden content, please Sign In or Sign Up This is the hidden content, please Sign In or Sign Up Link to comment Share on other sites More sharing options...
Recommended Posts