Purchase
Enter Price Code
Student
Instructor
IT Professional
Customer Support
Contact Us
TestOut Help Center
LMS Integration
Sign Up
CertMaster Login
Hands-on Technology Courseware
Courses
Course Catalog
Why TestOut
LabSim Learning Platform
TestOut Training
Lab Simulations
Customer Success
Certifications
Overview
Benefits
Pro Exams
Pro Exam Catalog
Pro Exam Resources
Wall of Fame
Who We Serve
K12 Education
Higher Education
Professionals
Resources
Product Guides
Job-Role Pathways
Educator Resources
Student Resources
TestOut Blog
Facebook Instructor Community
IT Career Interest Survey
Cybersecurity Scary Stories
How-To Guide for Passing ITF+
Unplugged Classroom Activities
Request Instructor Access
CyberDefense Pro
Certification Objectives
TestOut
CyberDefense Pro
Certification Objectives
Monitoring and Log Analysis
Monitor networks
Monitor network traffic
Monitor network ports and sockets
Monitor software and systems
Configure execution control and verify digital signatures
Analyze executable processes
Review web application security
Monitor email for malware
Analyze email headers and impersonation attempts
Implement Logging
Manage and perform analysis using Security Information and Event Management (SIEM) tools
Review event logs
Send log events to a remote syslog server
Review firewall logs
Threat Analysis and Detection
Perform threat analysis
Review firewall configuration
Conduct a trend analysis
Determine the types of vulnerabilities associated with different attacks
Detect threats using analytics and intelligence
Use an Intrusion Detection System (IDS)
Use a protocol analyzer and packet analysis to determine threats
Use endpoint protection tools
Check for privilege escalation
Perform digital forensics investigations
Risk Analysis and Mitigation
Implement security controls to mitigate risk
Detect unpatched systems
Configure host firewall policies
Implement anti-virus and endpoint security
Implement Intrusion Prevention System (IPS)
Implement cloud security
Perform application and data protection tasks
Implement and configure a security appliance
Implement system hardening
Disable unnecessary services
Check service configuration
Disable unnecessary ports
Perform penetration tests
Perform internal penetration testing
Perform external penetration testing
Implement defensive deception methods
Deploy a honeypot
Implement a black hole or sinkhole
Configure a captive portal
Incident Response
Manage security incidents
Resolve malware, ransomware, and phishing attacks
Eradicate Advanced Persistent Threats (APT)
Respond to Distributed Denial of Service (DDoS) attacks
Manage devices
Secure smartphones, tablets, and laptops
Implement data loss prevention
Secure embedded devices
Secure IOT devices
Implement network access control (NAC)
Analyze Indicators of compromise
Examine applications for any signs of compromise
Inspect systems for any signs of compromise
Investigate networks for any signs of compromise
Analyze indicators for false positives and false negatives
Audit and Compliance
Implement Identity and Access Management (IAM)
Administer user accounts
Manage user-based and role-based access
Manage certificates
Configure account policies and account control
Implement physical security controls
Analyze physical security design to protect systems.
Analyze system security design to protect systems.
Implement drive encryption
Implement physical access controls
Explore TestOut Pro Certifications
Benefits
Pro Exams
Resources