CYBERSECURITY | A live online course with Engineering Manager, Detection Engineering at Lyft | ELVTR
A LIVE ONLINE COURSE
with Engineering Manager,
Detection Engineering at Lyft
Dates:
15 DEC 2021 - 7 FEB 2022
Duration:
6 WEEKS WITH A 1.5-WEEK BREAK
MONDAYS & WEDNESDAYS
5 PM PST / 8 PM EST

Looking for a roadmap to a career in cybersecurity? You found it.

Kick off your career with purpose in the course that takes you behind the scenes at companies like Netflix and Lyft.

 

Do you see yourself below?
Then this course is for you.

  • IT PROFESSIONALS MAKING A SWITCH

     

    Move from a hobby interest to career fundamentals with real-world scenarios, demos, and career preparation.

  • COMPUTER SCIENCE AND ITS GRADS

     

    Step into the shoes of practitioners on the front lines of cyber defense and put together your own professional-grade security plan.

  • LIFELONG LEARNERS

     

    Understand the careful calculations behind the security architecture that protects your valuable personal and business data.

PREPARE TO ACCELERATE

Find your edge.

Where will you make your impact in cybersecurity? Break down the roles and mindsets of rockstar CS practitioners in a uniquely personal learning environment.

Fuel your vision.

Get your hands dirty with widespread frameworks like MITRE Att&ck and NIST CSF. Perform a real threat model on a potential attack vector and more. By the end of this course, you'll have more than just ambition on your side.

 
ABOUT THE COURSE
01
TOOLS

Deploy sophisticated tactics to respond to threats. You'll learn from past security events and live demos what protection and response look like at today's data-rich companies.

02
STRATEGY

Develop a recruiter-ready security plan. Get input from a senior security professional as you pull together compliance, tools, and culture.

03
CULTURE

Add value to your role with cybersecurity evangelism. Learn how to lead from the best as your organization sets up protection plans and builds a security-first culture.

04
CAREER

Erase complexity from the picture. Untangle 300+ certifications and domains to get a clear path to pursuing your dream role.

Instructor
  • Engineering Manager, Detection Engineering at Lyft
  • Helps strengthen U.S. national cybersecurity stance as Information Technology Advisor to the U.S. Department of State
  • Frequent speaker at industry events on topics including threat detection, digital forensics, reverse engineering, and emerging technologies
  • Boasts a decade of cybersecurity leadership at organizations including Netflix, Verizon, Capital One, IronNet Cybersecurity
  • Splunk-certified security systems architect, ethical hacker, and forensics investigator
  • Passionate about mentoring the rising generation of cybersecurity talent
John Haley
JOHN HALEY
COURSE INTRODUCTION
SYLLABUS
01
WED (12/15), 5 PM PST/8 PM EST
Intro to Cybersecurity

John will kick off your learning by outlining the vital role of cybersecurity in today's business world and the key concepts you'll refer to throughout the course.

  • Why cybersecurity?
  • Mission and origins
  • Foundational concepts

Assignment #01: Research a major cyber incident that occurred in the last 5 years and identify how the incident was disruptive.

more
02
MON (12/20), 5 PM PST/8 PM EST
Cybersecurity Domains

John parses down the broad domain of cybersecurity in specific CS roles and their requirements. Which area are you drawn to the most?

  • Application security
    • Demo: Burp Suite
    • Essential CS: OWASP Top 10
  • Email security
  • Cloud security
  • Network Security
  • Incident Response
  • Detection Engineering
  • Physical security

Assignment #02: Identify two domains in which you would be interested in pursuing a career. What appeals to you about them?

more
03
MON (1/3), 5 PM PST/8 PM EST
What Are Cyber Attacks?

You'll mirror the process employed at data-rich companies to break down an attack. John will show you how to use the MITRE Att&ck framework to form a profile of the attacker.

  • MITRE Att&ck Framework
  • Common types of cyber attacks
  • Countermeasures
  • Password best practices

Assignment #03: You will receive a case of a real attack on a company. Which Att&ck category do you think it falls under?

more
04
WED (1/5), 5 PM PST/8 PM EST
Threat Modeling

This class is about thinking with a mindset of threat modeling. You'll learn how to successfully identify threat actors and steps to determine a risk-reduction plan.

  • Principles of threat modeling
  • Performing a threat model (step-by-step)
  • Operationalizing the threat model

Assignment #04: Application #04: Perform a threat model on a scenario or threat vector.

more
05
MON (1/10), 5 PM PST/8 PM EST
Cyber Attack Prevention

Hackers can have many different goals behind an attack. You'll learn how to identify the "opportunities" for hackers at your company and prevent them with a few key tools.

  • The CIA Triad
    • Intro to encryption
  • Intrusion Prevention Systems
  • Hackers' goals for your company
  • WAF (Web Application Firewall) Solutions

Assignment #05: Research three WAF vendors. Compare and contrast the features of each.

more
06
WED (1/12), 5 PM PST/8 PM EST
Cyber Defense Strategies

So, your business has been attacked. Now what? You'll learn what to do first if an attack occurs and how to mitigate a worst-case scenario.

  • NIST CSF: The security-focused professional's best alley
  • Threat detection, incident response, and disaster recovery
  • SIEM
    • What are they?
    • Top vendors
  • Business continuity after a breach

Assignment #06: You will receive a case of a real incident. Use the NIST CSF to create a defense and recovery plan for the incident and return to normal operations.

more
07
WED (1/19), 5 PM PST/8 PM EST
Workshop: Splunk Threat Detection and Validation

You will use Splunk to work with certain data as you detect and validate threats. Work in groups to create an alert and then present your findings to the class.

  • Demo: Splunk

Assignment #07: Create a dashboard in Splunk and export it.

more
08
MON (1/24), 5 PM PST/8 PM EST
Vulnerability Management and Penetration Testing

What are the tools and processes needed to perform your own cybersecurity checkups? You'll learn how to continually identify weaknesses in systems, remediate them, and harden defenses against attacks.

  • What is Vulnerability Management?
    • Steps to conduct a vulnerability assessment.
    • Demo: Nessus Security Scanner
  • What is Penetration Testing?
    • Red Teaming
    • Purple Teaming
    • Bug Bounty programs

Assignment #08: Download Nessus Security Scanner and run it against your laptop. What did you find?

more
09
WED (1/26), 5 PM PST/8 PM EST
Digital Forensics

John will help you understand this opaque area of cybersecurity and introduce you to the tools used.

  • What is Digital Forensics? (Core concepts)
    • Overview of Wireshark
    • Overview Autopsy or Windows ...
  • Reverse Engineering Overview
    • Demo: Debugging basics

Assignment #09: Given a scenario/incident. How would you use digital forensics to discover the root cause of the incident?

more
10
MON (1/31), 5 PM PST/8 PM EST
Cybersecurity Evangelism and Compliance

John will share his own tried and true approaches for building security buy-in from teams and business partners. You'll review essential CS compliance requirements and how to implement them.

  • Evangelism
    • Demonstrating value to business partners
    • Qualification & quantification
  • How do cyber laws and regulations affect your everyday work?
  • What is regulatory compliance?
  • Important regulatory standards explained: GDPR, HIPAA, and more

Assignment #10: Take a look at the resource John will share after class. Identify three key factors of PCI compliance. What makes PCI compliance important?

more
11
WED (2/2), 5 PM PST/8 PM EST
What Are Companies Looking For?

John will walk you through his process for compiling candidate profiles. He'll show you how to prepare yourself to stand out, from resumé through interview.

What makes a great CS expert?

  • Skills of a strong candidate
  • Tools required
  • Common interview questions
  • Cybersecurity as code
  • Engineering-focused technical training
    • CISSP, Security +, AWS and SANS
    • Cybersecurity conferences

Assignment #11: Assess what skills are most important for your current company or the company of your choice. What do you already know? Prepare answers to the questions discussed in class.

more
12
MON (2/7), 5 PM PST/8 PM EST
The Future of Cybersecurity

How does the pandemic affect the cybersecurity field? How are threats and best practices evolving alongside changes in how work gets done? You'll hear from John on key cybersecurity trends to pay attention to as you prepare to launch your career.

  • Evolution of Cyber Strategy
    • Cloud
    • Zero Trust
  • Protecting your remote workspace
    • How to securely handle BYOD programs

Assignment #12: Using what you've learned in the last 6 weeks, outline a cybersecurity strategy for the company of your choice.

more
ENROLL
First name
This is required field!
Last name
This is required field!
Email
This is required field!
This is required field!
By registering and clicking “ENROLL”, you agree to our
Terms of Use, Privacy policy and Cookie Policy
 
 
 
 
ONE MOMENT...