Cyber Defense Specialist

The Cyber Defense Specialist works on designing solutions to reduce cyber threats. This role is essential in understanding computer attack methodologies. It aims to perform maneuvers which will aim to identify the level of vulnerabilities in the organization and to associate the right countermeasures with the failures found.

The cyber defense specialist may also be required to carry out incident analysis and identification activities. This is in order to identify the source and understand how these could have occurred in the environment using highly specialized tools.

The trainings below aim in particular to:

  • Discover the methodology of a computer attack - from reconnaissance to data exfiltration;
  • Know the means of cyber defense, in particular the concrete measures to stop a threat;
  • Identify best practices in implementing the organizational and technical security program;
  • Simulate computer attacks in order to discover system failures;
  • Detect and perform data analysis to identify the source of an attack;
  • Implement a continuity and continuous data protection strategy.

Possible certifications following the completion of your training:

  • EC-Council CEH, CND, LPT, CHFI, CSA, CPENT, ECIH, ECES, CTIA, EDRP;
  • SSCP;
  • CompTIA CySA+.
EC-Council’s Certified DevSecOps Engineer is a hands-on, comprehensive DevSecOps certification program that helps professionals build the essential skills for designing, developing, and maintaining secure applications.
1
Planned datePlanned date
Virtual classroom
Planned datePlanned date
Virtual classroom
Planned datePlanned date
Virtual classroom
Planned datePlanned date
Virtual classroom
Our most popular ethical hacking course - it brings together about 20 modules focused on offensive security and prepares to take the C|EH Knowledge and Practical exams.
1
Planned datePlanned date
Virtual classroom
Planned datePlanned date
Virtual classroom
Planned datePlanned date
Virtual classroom
Planned datePlanned date
Virtual classroom
A cybersecurity course with an emphasis on defense security - learn how to secure the network, as well as your business data.
Planned datePlanned date
Virtual classroom
Planned datePlanned date
Virtual classroom
Planned datePlanned date
Virtual classroom
Planned datePlanned date
Virtual classroom
An EC-Council training package providing increased preparation for the prestigious Certified Network Defender, Certified Ethical Hacker and Certified Penetration Testing Professional certifications.
Planned datePlanned date
Virtual classroom
Planned datePlanned date
Virtual classroom
Planned datePlanned date
Virtual classroom
Planned datePlanned date
Virtual classroom
The bootcamp is a package of two certifying trainings, allowing participants to acquire knowledge of both organizational security (CISSP) and offensive security (CEH).
This course is oriented towards defensive security - the training introduces the countermeasures to be implemented to ensure the security of a network.
This course demonstrates common techniques for defending a network from computer threats. It is also preparatory for the CS0-003 certification exam.
The SOC course is designed to help you acquiring knowledge in the management of a security operations center, as well as in incident analysis and management.
The CHFIv10 course informs you of forensics and computer data recovery practices.
Planned datePlanned date
Virtual classroom
Planned datePlanned date
Virtual classroom
Planned datePlanned date
Virtual classroom
Planned datePlanned date
Virtual classroom
The CPENT training teaches you the methodology for assessing intrusion of networks and systems in large environments.
This training introduces the methodology of incident management, including means of responding to cyber attacks on networks, data and applications.
The ECES course is designed to educate you on the various possibilities of data encryption, including cryptography protocols and procedures.
The CTIA training informs you of the tools and the appropriate methodology to manage cyber threats.
This intermediate level training demonstrates the possibilities of intruding and finding vulnerabilities in a computer network. It also prepares for the PT0-001 exam.
Learn how to put business continuity practices to work and how a recovery plan for your systems can aid in resuming business from incidents threatening your business.