Certcop – A division of Secbay Inc.
We combine the latest Cyber tools with original in-house designs to develop customized and advanced Cyber Security programs to meet the client’s requirements. CertCop offers training programs in the area of Pen testing using Kali Linux, Cyber Security Management, Incident Handling & Disaster Recovery, Application Security, Secure Coding, and customized SOC training programs according to client requirements.
- Certified and Highly Experienced Instructors
- Delivery Methods:
Virtual live / In-Class /On-site /1 on 1/ On-Demand - Certcop Flexible Scheduling (Day / Evening / Weekends)
- Certcop High Quality, Extensive and Industry Standard Curriculum
Certified Cybercop Blue Team – Defensive Security
The Certified Cybercop Blue Team program is designed to teach and evaluate real defensive security abilities across a wide variety of blue-team disciplines, making it ideal for newcomers to the sector as well as seasoned security professionals.
Target Audience
- Security/Network Defender
- IT Employs
- Security enthusiasts
- Students
- Entry-level Cybersecurity Position
Pre Requirements
This course requires a basic familiarity with TCP/IP and operating system principles. It’s a plus if you’re familiar with the Linux command line, network security monitoring, and SIEM technologies. Some fundamental security concepts are expected at this level.
Exam Details:
- Required exam—- Certified Cybercop Blue Team
- Number of questions—- Maximum of 90
- Types of questions—- Multiple-choice and performance-based
- Length of test—- 180 minutes
- Passing score—- 70%
Course Content
- CHAPTER 1 Blue Team Methodology
- CHAPTER 2 Recruiting Blue Team Members
- CHAPTER 3 Inro to Linux
- CHAPTER 4 Setting Localization Options
- CHAPTER 5 Sifting through Services
- CHAPTER 6 Package Management and Repositories
- CHAPTER 7 Kali Linux Bash Scripting
- CHAPTER 8 Linux Firewalls
- CHAPTER 9 Identity and Access (IAM)
- CHAPTER 10 Vulnerability Scanning
- CHAPTER 11 Threat and Vulnerability Management
- CHAPTER 12 Security Information and Event Management (SIEM)
- CHAPTER 13 Incident Response Toolkit/Process
- CHAPTER 14 Digital Forensics
- CHAPTER 15 SOAR – Security Orchestration Automation Response
- CHAPTER 16 Policies to Mitigate Risk
- CHAPTER 17 Software and Systems Security
- CHAPTER 18 Software Development Life Cycle (SDLC)
- CHAPTER 19 Mobile Device Hacking
- CHAPTER 20 Cryptography and PKI
Course Features
- Lectures 30
- Quizzes 0
- Duration 18.5 hours
- Skill level All levels
- Language English
- Students 324
- Assessments Yes
Curriculum
- 2 Sections
- 30 Lessons
- 365 Days
- Certified Cybercop Blue Team - Defensive Security24
- 1.0Blue Team Introduction33 Minutes
- 1.1Blue Team Methodology44 Minutes
- 1.2Recruiting Blue Team Members20 Minutes
- 1.3Introduction to Linux52 Minutes
- 1.4Setting Localization Options20 Minutes
- 1.5Sifting through services.83 Minutes
- 1.6Package Management and Repositories38 Minutes
- 1.7Kali Linux Bash Scripting27 Minutes
- 1.8Linux Firewalls39 Minutes
- 1.9Vulnerability Scanning Part-116 Minutes
- 1.10Vulnerability Scanning Part-226 Minutes
- 1.11Threat and Vulnerability Management36 Minutes
- 1.12Security Information Event Management28 Minutes
- 1.13Incident Response Toolkit/Process31 Minutes
- 1.14Digital Forensics35 Minutes
- 1.15Security Orchestration, Automation, and Response (SOAR)40 Minutes
- 1.16Policies to Mitigate Risk19 Minutes
- 1.17Software and Systems Security65 Minutes
- 1.18Software Development Lifecycle (SDLC)34 Minutes
- 1.19Mobile Device Hacking 167 Minutes
- 1.20Mobile Device Hacking 29 Minutes
- 1.21Cryptography and PKI30 Minutes
- 1.22ChatGPT17 Minutes
- 1.23Blue Team Case Study45 Minutes
- Certified Cybercop Blue Team - Defensive Security - LABS6




