Course Overview:
The Cylance course is designed to provide IT professionals, cybersecurity specialists, and system administrators with the knowledge and skills to effectively deploy, configure, and manage Cylance’s AI-driven security solutions. The course covers key concepts such as AI-based threat detection, endpoint protection, and incident response.
Course Outline:
- Introduction to Cylance
- Overview of Cylance and its innovative approach to cybersecurity
- Understanding the role of AI and ML in threat detection
- Cylance product offerings and key features
- Installation and Configuration
- Installing Cylance security solutions
- Initial setup and configuration steps
- Navigating the Cylance console
- AI and Machine Learning in Cybersecurity
- Fundamentals of AI and ML in threat detection
- How Cylance uses predictive models to prevent cyber attacks
- Advantages of AI-driven cybersecurity
- Endpoint Protection
- Setting up CylancePROTECT for endpoint security
- Configuring endpoint protection policies
- Managing and monitoring endpoints
- Threat Detection and Prevention
- Understanding Cylance’s approach to threat detection
- Configuring real-time threat detection settings
- Managing and responding to detected threats
- Advanced Persistent Threats (APTs)
- Identifying and mitigating APTs using Cylance solutions
- Configuring Cylance to protect against targeted attacks
- Best practices for APT defense
- Incident Response and Management
- Using CylanceOPTICS for incident response
- Configuring automated response and remediation actions
- Investigating and documenting security incidents
- Cloud-Based Management
- Introduction to Cylance’s cloud-based management platform
- Setting up and managing devices remotely
- Using cloud tools for reporting and analytics
- Data Protection and Compliance
- Ensuring data protection with Cylance solutions
- Configuring encryption and secure storage
- Compliance with industry regulations and standards
- Troubleshooting and Support
- Common issues and troubleshooting techniques
- Accessing Cylance support resources
- Maintaining and optimizing security configurations
- Final Assessment and Certification
- Review of course content
- Practical assessment or case study
- Certification process and obtaining credentials