search
top

SEC530: Defensible Security Architecture and Engineering – Zero Trust

Why take this course?

One of the major reasons on why I chose to take SEC530 is due to the class syllabus. A big item that stood out to me was learning more about implementing Zero Trust and an Insider Threat program. The course has a whole day dedicated to just those topics alone. Being in a Security Engineering role, this course is a great way to understand how to assess your current defenses within your organization. But, also allows you to plan ahead for future controls that may need to be built out over time.

If you’ve got an extensive amount of experience already working within the cyber security world. Then, some of the defenses may be items that you have already worked on or have some exposure on. For me personally, a lot of the materials from Day 1-3 were concepts and practical work that I have already experienced. However, Day 4-5 were excellent in learning new topics/ideas that will at least for me lead to fun future projects.

I took the vLive course option, which in my case was also taking place in person. So, it was a hybrid class with students in person, as well as students (such as me) taking it remotely for the week.

Day 1

The start to the course will go over many basic concepts related to best practices for physical and network security. You’ll get to play with the MITRE Framework, and understand the cyber kill chain. There is a good chunk of time dedicated to learning about various types of NetFlow data (on prem networking devices, cloud, endpoint). It’s a great start to the course to warm you up to the good stuff!

Day 2

Read More About This Post

Review of SANS FOR 508 & Winning the CTF Coin

So, just before the end of a remarkably interesting and odd 2020 year. I decided to go ahead and take the FOR 508 class on Advanced Incident Response, Threat Hunting, and Digital Forensics. I felt this was a course that could really benefit security practitioners for understanding best practices & methods related to IR. As well as, learning new techniques for threat hunting in a large enterprise environment. I decided to put up a post listing our what you can plan to learn from this course should you decide to take it.

Winning the Coin

One of the coolest parts of the class is Day 6 (more details listed later). You get a chance to join into teams and compete in a class APT Threat group challenge. The team that wins the CTF gets an award in the sign of a special course specific SANS Coin. On top of that, SANS will add your name to the Community DFIR Coin holders list! It is a great achievement, and I have to say the challenge was very realistic and fun to tackle.

Read More Of This Post

top