Learn Cyber Resilience techniques and strategies
Get hands-on experience with offensive and defensive security tools and tactics using a cloud-based lab environment
Apply what you learn here to prepare and protect your organization
Learning how to anticipate, resist and recover from attacks or compromises in today’s security landscape has never been more important – this is Cyber Resilience and it’s the key to your organization’s cybersecurity health and future. But how do you become Cyber Resilient? And why is it important in today’s Cyber environment? In this course we will explore how to prepare, protect, defend, withstand and recover while examining the latest Cyber threats that we are faced with today. Using real-world examples, Ron Taylor - Security Architect and trainer with over 20 years of experience – will detail the steps you can take to keep your organization resilient. Students will be given access to a cloud-based lab environment so you can dive in and get hands-on experience with offensive and defensive security tools and tactics.
The timeframes are only estimates and may vary according to how the class is progressing.
Hands-on Lab Intro (10 mins)
Introduction to Cyber Resilience Bootcamp Lab Environment
Demo: Lab environment overview
Overview of Cyber Resilience and Current Threats, Attacks and Adversary Tactics (45 min)
Understanding the concept of Cyber Resilience
Discuss the latest threats, attacks and adversary tactics being seen in the wild
Anticipate - Explore how to prepare your organization to defend against the latest threats (45 min)
Using penetration testing and vulnerability assessments
Understanding best practice for security process implementation
Exploring real-world concepts for endpoint security posture and hardening
Withstand - Understand how to protect and defend your organization from the latest threats (40 min)
Using best practices to ensure your organization can withstand the latest attacks
Exploring concepts related to network security posture and hardening
Exploring Threat Hunting concepts and tactics
Surveying the importance of endpoint security visibility
Recover - How to put a plan in place to more quickly recover from the inevitable attacks (40 min)
Understanding what to do when you do get hacked. Because eventually everyone does so you must be prepared.
Strategies for recovering from an attack/compromise.
Adapt – Understanding how to learn from and adapt to changes in your environment (25 min)
What does it mean to adapt in a Cyber Resilient environment.
An analysis of how the changes that occur can change the attack surface
What adjustments should be made and how quickly can they be implemented.
Wrap-up – Q&A (15 min)
The Lab environment for this course is hosted on Cisco Dcloud. You will be assigned a lab pod when the class starts. From there you will receive an email with a link to the lab environment. You can also login directly at dcloud.cisco.com.
The lab guide can be downloaded from the resources section in the lab environment once you login?
The lab pods are scheduled and assigned for one week. However, this can be extended at your request.
Please send an email to rontay at cisco.com