Jump to content
YOUR-AD-HERE
HOSTING
TOOLS

Locked Junior Security Operations Certification


itsMe

Recommended Posts

This is the hidden content, please

Why Our Training?

The training course and certification exam were created under the supervision of our Academic Advisory Board, comprised of Senior Security Analysts, SOC Managers, and other senior security roles; ensuring it is accurate, realistic, and applicable to modern security operations.

We have proven that our training can help change lives. Our students have broken into industry or secured promotions as a result of taking our certifications. We have developed the skills of entire security teams and forged stronger technical defenders. Don’t believe us? Believe them! Read our BTL1 success stories at the link below.

Who is the course for?

BTL1 is designed to train technical defenders that are capable of defending networks and responding to cyber incidents. Below are some examples of the skills and experience you will gain.

    Analysing and responding to phishing attacks
    Performing forensics investigations to collect and analyse digital evidence
    Using a SIEM platform to investigate malicious activity
    Log and network traffic analysis including malware infections
    Conducting threat actor research
    and much more!

The skills and tools you’ll learn in this course will be directly applicable to a range of security roles, and are actively used by defenders around the world.

WHY CHOOSE BTL1?

BTL1 is perfect for security enthusiasts or professionals that want to develop their practical defensive cyber skills. Roles that we believe would benefit from this course include:

    Students/IT Personnel
    Security Analysts
    Incident Responders
    Threat Intelligence Analysts
    Forensics Analysts

Whilst our content is aimed primarily at entry-level or junior roles, read our course syllabus to see if BTL1 is the right choice for you or your team!

BTL1 meets 60% of the 125 requirements under the NICE Cyber Defense Analyst framework, including 67% of knowledge and 67% of ability.

Tools covered

Autopsy, Browser History Capturer, Browser History Viewer, DeepBlueCLI, DomainTools, Event Viewer, FTK Imager, JumpList Explorer, KAPE, Linux CLI, MISP, OpenCTI, PECmd, PhishTool, PowerShell, ProcDump, Scalpel, Sigma, Snort, Splunk, Suricata, TheHive5, URL2PNG, VirusTotal, Volatility, WannaBrowser, Windows File Analyzer, Wireshark

This is the hidden content, please

This is the hidden content, please

Link to comment
Share on other sites

Guest
This topic is now closed to further replies.
×
×
  • Create New...

Important Information

We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.