Learning Outcomes
At the end of this course, participants will be able to:
-
Explain the role of the Cybersecurity Operations Analyst in the enterprise;
- Install virtual machines to create a safe environment for implementing and analyzing cybersecurity threat events;
- Explain the Windows Operating System features and characteristics needed to support cybersecurity analyses;
- Explain the features and characteristics of the Linux Operating System;
- Analyze the operation of network protocols and services;
- Explain the operation of the network infrastructure;
- Classify the various types of network attacks