Blue Team Track (CND->CIH->CHFI)

NICE Framework

The Blue Team

Blue Teams specialize in in-depth attack analysis and response, malware reverse-engineering and forensics. The first mission of the Blue Team is to isolate and contain threats. Blue Teams are often notified of these threats by Security Operations Team (SOC) operators and serve as second-level response and support engineers. Once threats are contained isolated, Blue Team specialist will perform forensic analysis of affected systems and collect data to be used for process improvement and/or legal purposes. Blue Teams often serve as the last line of defense against cybersecurity threats and attacks.


NICE Framework Overview

About the Certified Network Defender Program and Certification


Certified Network Defender (CND) is a vendor-neutral, hands-on, instructor-led comprehensive network security certification training program. It is a skills-based, lab intensive program based on a job-task analysis and cybersecurity education framework presented by the National Initiative of Cybersecurity Education (NICE). The course has also been mapped to global job roles and responsibilities and the Department of Defense (DoD) job roles for system/network administrators. The course is designed and developed after extensive market research and surveys.

The program prepares network administrators on network security technologies and operations to attain Defense-in-Depth network security preparedness. It covers the protect, detect and respond approach to network security. The course contains hands-on labs, based on major network security tools and techniques which will provide network administrators real world expertise on current network security technologies and operations. The study-kit provides you with over 10 GB of network security best practices, assessments and protection tools. The kit also contains templates for various network policies and a large number of white papers for additional learning.






About the Certified Incident Handler Program and Certification


The EC-Council Certified Incident Handler (ECIH) program is designed to provide the fundamental skills to handle and respond to the computer security incidents in an information system. The course addresses various underlying principles and techniques for detecting and responding to current and emerging computer security threats. Students will learn how to handle various types of incidents, risk assessment methodologies, and various laws and policies related to incident handling. After attending this course, they will be able to create incident handling and response policies as well as deal with various types of computer security incidents.

The IT incident management training program will enable students to be proficient in handling and responding to various security incidents such as network security incidents, malicious code incidents, and insider attack threats. In addition, students will learn about computer forensics and its role in handling and responding to incidents. The course also covers incident response teams, incident management training methods, and incident recovery techniques in detail. The ECIH certification will provide professionals greater industry acceptance as the seasoned incident handler.






About the Computer Hacking Forensics Investigator Program and Certification

CHFI is a comprehensive course and certification covering major forensic investigation scenarios that enables students to acquire necessary hands-on experience on various forensic investigation techniques and standard forensic tools necessary to successfully carryout computer forensic investigation leading to prosecution of perpetrators CHFI presents a methodological approach to computer forensic including searching and seizing, chain-of-custody, acquisition, preservation, analysis and reporting of digital evidence.



 

 

Have Questions Or Ready To Find Out More? Contact One of Our Training Advisors