Python for Offensive PenTesting: A Complete Practical Course
Corporate & Strategic Communication Skills for Managers
Coaching and Mentor Skills
The Complete Management Skills Certification Course
Information Privacy (FOIA, PII, HIPPA, ECPA) 3
Business Acumen
Computer Network Defense
Incident Management (Threats and Attacks)
Information Systems / Network Security
Infrastructure Design
Computer Systems Analysis/Enterprise Security
Threat Analysis
Vulnerabilities Assessment
Computer Systems Networking and Telecommunications
Computer/Information Technology Administration and Management
Computer and Information Sciences and Support Services
Information Technology Project Management
Introduction to Digital Crime/Forensics
Introduction to Ethical Hacking
Introduction to Penetration testing/Python
Security and Risk Management
Asset Management
Security and Architecture and Engineering
Identity and Access management
Software Development security
Security Assessment and testing
Security Operations
Communication and Network Security
On-the-job training
Manage information technology projects or system activities.
Coordinate monitoring of networks or systems for security breaches or intrusions.
Coordinate vulnerability assessments or analysis of information security systems.
Oversee development of plans to safeguard computer files against accidental or unauthorized modification, destruction, or disclosure or to meet emergency data processing needs.
Oversee performance of risk assessment or execution of system tests to ensure the functioning of data processing activities or security measures.
Develop software or computer applications.
Develop or implement software tools to assist in the detection, prevention, and analysis of security threats.
Develop or install software, such as firewalls and data encryption programs, to protect sensitive information.
Install computer software.
Develop or implement software tools to assist in the detection, prevention, and analysis of security threats.
Develop or install software, such as firewalls and data encryption programs, to protect sensitive information.
Analyze security of systems, network, or data.
Python use, identify security system weaknesses using penetration tests.
Coordinate reporting or editing activities.
Coordinate documentation of computer security or emergency measure policies, procedures, or tests.
Develop operating strategies, plans, or procedures.
Develop response and recovery strategies for security breaches: Intrusion detection methodologies and techniques for detecting host and network-based intrusions; Protect a network against malware; Damage assessments; Secure network communications; Use of security event correlation tools; Identify, capture, contain, and report malware
Develop performance metrics or standards related to information technology
Develop information security standards and best practices. Business continuity and disaster recovery continuity of operations plans
Establish work standards.
Develop information security standards and best practices.
Evaluate potential of products, technologies, or resources.
Identify or implement solutions to information security problems.
Evaluate utility of software or hardware technologies
Assess the quality of security controls using performance indicators; Review Organizational Processes against security controls
Implement security measures for computer or information systems.
Identify or implement solutions to information security problems: Intrusion detection; Host and network-based intrusions; Protect a network against malware; Secure network communications; Identity and Access management and technologies; Adjust for cloud considerations
Investigate illegal or suspicious activities.
Conduct investigations of information security breaches to identify vulnerabilities and evaluate the damage.
Monitor processes for compliance with standards.
Review security assessments for computing environments or check for compliance with cybersecurity standards and regulations.
Provide technical guidance to other personnel.
Provide technical support to computer users for installation and use of security products.
Read documents to gather technical information
Review security assessments for computing environments or check for compliance with cybersecurity standards and regulations.
Recommend changes to improve computer or information systems.
Recommend information security enhancements to management. Recognize and categorize types of vulnerabilities and associated attacks.
Supervise information technology personnel.
Train staff on and oversee the use of information security standards, policies, and best practices.
Test computer system operations to ensure proper functioning.
Scan networks using vulnerability assessment tools to identify vulnerabilities.
Train personnel in technical or scientific procedures
Train staff on and oversee the use of information security standards, policies, and best practices.
Troubleshoot issues with computer applications or systems.
Troubleshoot security and network problems.
Write reports or evaluations
Write reports regarding investigations of information security breaches or network evaluations.
Interested in this apprenticeship?
Sign up to receive notifications about changes and updates about Cyber Defense Incident Responder.