- Type Learning
CyberEd Cyber Warrior Level 2: Defender
Issued by
CyberEd.io
This path is the second pathway in the Cyber Warrior series. This pathway covers the basics of Information Technology and Information Security, to include basic hardware, software, networking, cloud and security. This pathway is for the professional that has a foundation in Information Technology and wants an efficient, military-like way to be "brought up to speed" on latest IT and Security concepts. If you are comfortable with these concepts already, dive right in. 64 Hours
- Type Learning
Skills
Earning Criteria
-
CompTIA Security+ : This learning path builds on your existing networking skills and prepares you to earn your Security+, one of the most popular entry-level cybersecurity certifications. You’ll learn the foundations of information security as you progress through 13 courses tied to the six Security+ certification exam objectives. Upon completion, you’ll be prepared to earn your Security+ certification and have an established base of cybersecurity knowledge you can use.
-
CompTIA Linux+: Linux + introduces learners to Linux, an open-source operating system which is available to anyone seeking an alternative to mainstream operating systems. This course will cover Linux fundamentals such as; installing and configuring Linux, securing Linux, managing files and directories, configuring storage, scripting, containers, automating tasks, networking, and troubleshooting Linux. These topics are presented in a distribution agnostic manner.
-
Malware: This learning path builds on your existing networking skills and prepares you to earn your Security+, one of the most popular entry-level cybersecurity certifications. You’ll learn the foundations of information security as you progress through 13 courses tied to the six Security+ certification exam objectives. Upon completion, you’ll be prepared to earn your Security+ certification and have an established base of cybersecurity knowledge.
-
Malware Analysis: Malware Analysis is the practice of determining and analyzing suspicious files on endpoints and within networks using dynamic analysis, static analysis, or full reverse engineering.