info@commonwealthtca.com
Language  
English
French
Spanish
German
Italian
Russina
Arabic
Turkish
Home
Courses
Cities
Associations
Services
About Us
Contact Us
Course Category
Accounting and Finance
Administration and Secretarial
Auditing and Governance, Risk and Compliance
Banking, Insurance and Financial Services
Business Continuity and Crisis Management
Communication and Writing Skills
Construction Management
Contracts Management
Customer Service
Data Management and Business Intelligence
Digital Innovation and Transformation
Energy and Water Management
Financial Technology (FinTech)
Health, Safety and Environment
Human Resources and Training
Interpersonal Skills and Self Development
IT Management
Leadership and Management
Legal
Maintenance and Engineering
Marketing and Sales
Monetary Economics
Monitoring and Evaluation
Oil and Gas
Planning and Strategy Management
Port and Shipping Management
Procurement and Supply Chain Management
Project Management
Public Relations
Quality and Productivity
Security Management
Tourism Management
Transport and Logistics
More Links
Public Training Courses
Certified Training Courses

SEC501: Advanced Security Essentials - Enterprise Defender

Why Attend

It costs enterprises worldwide billions of dollars annually to respond to malware, and particularly Ransomware, attacks. So it is increasingly necessary to understand how such software behaves. Ransomware spreads very quickly and is not stealthy; as soon as your data become inaccessible and your systems unstable, it is clear something is amiss. Beyond detection and response, when prevention has failed, understanding the nature of malware, its functional requirements, and how it achieves its goals is critical to being able to rapidly reduce the damage it can cause and the costs of eradicating it.

Overview

Course Outline

Schedule & Fees

Course Methodology

Instructor-led training that uses interactive learning methods, including class discussion, small group activities, and role-playing

Course Objectives

Identify network security threats against infrastructure and build defensible networks that minimize the impact of attacks; Utilize tools to analyze a network to prevent attacks and detect the adversary; Decode and analyze packets using various tools to identify anomalies and improve network defenses; Understand how the adversary compromises systems and how to respond to attacks using the six-step incident handling process; Perform penetration testing against an enterprise to determine vulnerabilities and points of compromise; Use various tools to identify and remediate malware across your enterprise

Target Audience

Target Competencies

n/a

Day 1

Definsible Network Architichuer 

  • Security Standards and Audit

  • Authentication, Authorization, and Accounting

  • Defending Network Infrastructure

  • Intrusion Prevention Systems and Firewalls

  • Name Resolution Attacks and Defense

  • Securing Private and Public Cloud Infrastructure

Day 2

Penetration Testing

  • Penetration Testing Scoping and Rules of Engagement

  • Online Reconnaissance

  • Social Engineering

  • Network Mapping and Scanning Techniques

  • Enterprise Vulnerability Scanning

  • Network Exploitation Tools and Techniques

  • Post-Exploitation and Pivoting

  • Web Application Exploitation Tools and Techniques

  • Reporting and Debriefing

Day 3

Security Operation Foundation

  • Network Security Monitoring

  • Advanced Packet Analysis

  • Network Intrusion Detection/Prevention

  • Writing Signatures for Detection

  • Network Forensics and More

  • Event Management Introduction

  • Continuous Monitoring

  • Logging and Event Collection and Analysis

  • SIEM and Analytics

Day 4

Digital Forensics and Incident Response

  • Active Defense

  • DFIR Core Concepts: Digital Forensics

  • DFIR Core Concepts: Incident Response

  • Modern DFIR

  • Widening the Net: Scaling and Scoping

Day 5

Malware Analysis

  • Introduction to Malware Analysis

  • Malware Analysis Stages: Fully Automated and Static Properties Analysis

  • Malware Analysis Stages: Interactive Behavior Analysis

  • Malware Analysis Stages: Manual Code Reversing

$4475

Vienna

Country: Austria

Duration: One week

Date: 17–21 Nov 2025

Register

$1375

Arusha

Country: Tanzania

Duration: One week

Date: 22–26 Jun 2026

Register