-
-
Notifications
You must be signed in to change notification settings - Fork 1
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
- Loading branch information
Showing
26 changed files
with
871 additions
and
0 deletions.
There are no files selected for viewing
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
67 changes: 67 additions & 0 deletions
67
src/content/certifications/mosse-institute/certified-blue-teamer.mdx
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,67 @@ | ||
--- | ||
title: "MBT - Certified Blue Teamer" | ||
acronym: "MBT" | ||
last_updated_at: 2024-09-30 | ||
image: "../../../assets/mbt-certified-blue-teamer.png" | ||
reference: "https://www.mosse-institute.com/certifications/mbt-certified-blue-teamer.html" | ||
aliases: | ||
- "Certified Blue Teamer" | ||
draft: false | ||
career_paths: | ||
- "Blue Team Specialist" | ||
- "Cybersecurity Manager" | ||
- "Security Operations Specialist" | ||
price: "595" | ||
currency: "$" | ||
--- | ||
|
||
# {frontmatter.title} ({frontmatter.acronym}) | ||
|
||
## Overview | ||
|
||
The **MBT - Certified Blue Teamer** certification is a globally recognized standard of excellence in Cyber Defense. This | ||
certification is designed for professionals who bridge the gap between cybersecurity and IT operations, serving as the | ||
first responders to incidents and working proactively to identify and mitigate threats. | ||
|
||
The certification validates an individual’s ability to: | ||
|
||
- Respond effectively to security incidents and mitigate damage. | ||
- Identify and analyze potential threats before they escalate. | ||
- Collaborate with diverse teams to enhance organizational security. | ||
|
||
## Course Details | ||
|
||
The MBT certification program emphasizes both theoretical knowledge and practical skills necessary for effective | ||
cybersecurity defense. Participants will gain insights into the complexities of modern IT systems and how to protect | ||
them. | ||
|
||
### Topics Covered: | ||
|
||
- Incident response strategies and containment techniques. | ||
- Proactive threat identification and risk assessment. | ||
- Collaboration between cybersecurity and IT operations teams. | ||
- Understanding complex systems and their vulnerabilities. | ||
|
||
## Exam Structure | ||
|
||
The MBT certification is awarded upon successful completion of a practical exam that evaluates the candidate's ability | ||
to apply blue team principles in real-world scenarios. | ||
|
||
### Key Exam Requirements: | ||
|
||
- Practical exercises simulating typical blue team challenges. | ||
- Documentation of incident response strategies employed during the exam. | ||
|
||
## Who Should Take MBT? | ||
|
||
The MBT certification is ideal for: | ||
|
||
- Aspiring blue team specialists looking to enter the cybersecurity field. | ||
- Cybersecurity managers seeking to enhance their team's defensive capabilities. | ||
- Security operations specialists focused on protecting networks and systems from cyberattacks. | ||
|
||
## Resources | ||
|
||
- **Certification Details | ||
**: [MBT Certification](https://www.mosse-institute.com/certifications/mbt-certified-blue-teamer.html) | ||
- **Exam Registration**: Contact Mosse Institute for details on registration and pricing. |
67 changes: 67 additions & 0 deletions
67
src/content/certifications/mosse-institute/certified-cloud-penetration-tester.mdx
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,67 @@ | ||
--- | ||
title: "MCPT - Certified Cloud Penetration Tester" | ||
acronym: "MCPT" | ||
last_updated_at: 2024-09-30 | ||
image: "../../../assets/mcpt-cloud-penetration-tester.png" | ||
reference: "https://www.mosse-institute.com/certifications/mcpt-cloud-penetration-tester.html" | ||
aliases: | ||
- "Certified Cloud Penetration Tester" | ||
draft: false | ||
career_paths: | ||
- "Penetration Tester" | ||
- "Cloud Security Specialist" | ||
- "Cybersecurity Manager" | ||
price: "450" | ||
currency: "$" | ||
--- | ||
|
||
# {frontmatter.title} ({frontmatter.acronym}) | ||
|
||
## Overview | ||
|
||
The **MCPT - Certified Cloud Penetration Tester** certification focuses on the critical skills needed to identify and | ||
exploit vulnerabilities within cloud infrastructures. As organizations increasingly adopt cloud technologies, the demand | ||
for skilled cloud penetration testers has surged. This certification equips professionals with the knowledge to conduct | ||
effective penetration testing on major cloud platforms such as AWS, GCP, and Azure. | ||
|
||
The certification validates an individual’s ability to: | ||
|
||
- Identify security vulnerabilities in cloud services. | ||
- Conduct penetration testing engagements in cloud environments. | ||
- Mitigate security risks associated with cloud-based systems. | ||
|
||
## Course Details | ||
|
||
The MCPT certification program provides comprehensive training in cloud penetration testing methodologies. It emphasizes | ||
hands-on experience and practical skills necessary for conducting security assessments in cloud environments. | ||
|
||
### Topics Covered: | ||
|
||
- Fundamentals of cloud penetration testing. | ||
- Identifying vulnerabilities in AWS, GCP, and Azure. | ||
- Techniques for exploiting cloud services and applications. | ||
- Best practices for reporting and mitigating vulnerabilities. | ||
|
||
## Exam Structure | ||
|
||
The MCPT certification is awarded upon successful completion of a practical exam that evaluates the candidate's ability | ||
to conduct penetration tests in a simulated cloud environment. | ||
|
||
### Key Exam Requirements: | ||
|
||
- Practical scenarios that simulate real-world penetration testing challenges. | ||
- Documentation of findings and recommendations for remediation. | ||
|
||
## Who Should Take MCPT? | ||
|
||
The MCPT certification is ideal for: | ||
|
||
- Aspiring penetration testers focused on cloud technologies. | ||
- Cybersecurity managers looking to enhance their team's capabilities in cloud security. | ||
- IT professionals seeking to specialize in cloud security assessments. | ||
|
||
## Resources | ||
|
||
- **Certification Details | ||
**: [MCPT Certification](https://www.mosse-institute.com/certifications/mcpt-cloud-penetration-tester.html) | ||
- **Exam Registration**: Contact Mosse Institute for details on registration and pricing. |
67 changes: 67 additions & 0 deletions
67
src/content/certifications/mosse-institute/certified-cloud-security-engineer.mdx
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,67 @@ | ||
--- | ||
title: "MCSE - Certified Cloud Security Engineer" | ||
acronym: "MCSE" | ||
last_updated_at: 2024-09-30 | ||
image: "../../../assets/mcse-certified-cloud-security-engineer.png" | ||
reference: "https://www.mosse-institute.com/certifications/mcse-certified-cloud-security-engineer.html" | ||
aliases: | ||
- "Certified Cloud Security Engineer" | ||
draft: false | ||
career_paths: | ||
- "Cloud Security Specialist" | ||
- "Cybersecurity Manager" | ||
- "Risk Management Specialist" | ||
price: "450" | ||
currency: "$" | ||
--- | ||
|
||
# {frontmatter.title} ({frontmatter.acronym}) | ||
|
||
## Overview | ||
|
||
The **MCSE - Certified Cloud Security Engineer** certification is designed for professionals aiming to secure data and | ||
applications hosted on cloud platforms. As organizations increasingly migrate their operations to the cloud, the demand | ||
for skilled cloud security engineers has surged. This certification equips individuals with the knowledge and skills | ||
necessary to protect cloud environments from cyber threats. | ||
|
||
The certification validates an individual’s ability to: | ||
|
||
- Implement security measures across various cloud platforms. | ||
- Understand and mitigate vulnerabilities in cloud services. | ||
- Manage access controls and identity management effectively. | ||
|
||
## Course Details | ||
|
||
The MCSE certification focuses on essential cloud security practices, emphasizing hands-on training in securing popular | ||
cloud services such as AWS, GCP, and Azure, as well as container technologies like Docker and Kubernetes. | ||
|
||
### Topics Covered: | ||
|
||
- Hardening cloud environments (AWS, GCP, Azure). | ||
- Implementing security features like encryption and access controls. | ||
- Understanding vulnerabilities specific to cloud architectures. | ||
- Best practices for managing security in containerized applications. | ||
|
||
## Exam Structure | ||
|
||
The MCSE certification is awarded upon successful completion of a practical exam that evaluates the candidate's ability | ||
to secure cloud environments effectively. | ||
|
||
### Key Exam Requirements: | ||
|
||
- Practical scenarios that simulate real-world cloud security challenges. | ||
- Documentation of security measures implemented during the exam. | ||
|
||
## Who Should Take MCSE? | ||
|
||
The MCSE certification is ideal for: | ||
|
||
- Cloud security specialists looking to enhance their skills. | ||
- Cybersecurity managers responsible for overseeing cloud security initiatives. | ||
- IT professionals aiming to specialize in risk management within cloud environments. | ||
|
||
## Resources | ||
|
||
- **Certification Details | ||
**: [MCSE Certification](https://www.mosse-institute.com/certifications/mcse-certified-cloud-security-engineer.html) | ||
- **Exam Registration**: Contact Mosse Institute for details on registration and pricing. |
67 changes: 67 additions & 0 deletions
67
src/content/certifications/mosse-institute/certified-cyber-defense-analyst.mdx
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,67 @@ | ||
--- | ||
title: "MCDA - Certified Cyber Defense Analyst" | ||
acronym: "MCDA" | ||
last_updated_at: 2024-09-30 | ||
image: "../../../assets/dcwf-cyber-defense-analyst.png" | ||
reference: "https://www.mosse-institute.com/dcwf-certifications/mcda-certified-cyber-defense-analyst.html" | ||
aliases: | ||
- "Certified Cyber Defense Analyst" | ||
draft: false | ||
career_paths: | ||
- "Blue Team Specialist" | ||
- "Cybersecurity Manager" | ||
- "Security Operations Specialist" | ||
price: "1295" | ||
currency: "$" | ||
--- | ||
|
||
# {frontmatter.title} ({frontmatter.acronym}) | ||
|
||
## Overview | ||
|
||
The **MCDA - Certified Cyber Defense Analyst** certification is designed to equip professionals with the essential | ||
skills required to detect, analyze, and mitigate cyber threats. This certification focuses on building proficiency in | ||
various cybersecurity functions, ensuring participants are well-prepared to secure organizations against modern digital | ||
threats. | ||
|
||
The certification validates an individual’s ability to: | ||
|
||
- Conduct thorough log analysis and intrusion detection. | ||
- Analyze and respond to cyber threats using advanced tools. | ||
- Understand both strategic and tactical aspects of cybersecurity operations. | ||
|
||
## Course Details | ||
|
||
The MCDA certification program covers critical areas such as system security, network security, and threat analysis. | ||
Participants will engage in hands-on training that emphasizes practical skills necessary for effective cyber defense. | ||
|
||
### Topics Covered: | ||
|
||
- System and network security fundamentals. | ||
- Techniques for log analysis and threat detection. | ||
- Advanced tools for identifying and responding to cyber incidents. | ||
- Best practices for securing IT infrastructures. | ||
|
||
## Exam Structure | ||
|
||
The MCDA certification is awarded upon successful completion of a comprehensive exam that evaluates the candidate's | ||
ability to apply cyber defense concepts in real-world scenarios. | ||
|
||
### Key Exam Requirements: | ||
|
||
- Practical exercises simulating typical cyber defense challenges. | ||
- Documentation of techniques and tools used during the exam. | ||
|
||
## Who Should Take MCDA? | ||
|
||
The MCDA certification is ideal for: | ||
|
||
- Blue team specialists looking to enhance their threat detection capabilities. | ||
- Cybersecurity managers aiming to improve their organization's incident response strategies. | ||
- Security operations specialists focused on defending against cyber threats. | ||
|
||
## Resources | ||
|
||
- **Certification Details | ||
**: [MCDA Certification](https://www.mosse-institute.com/dcwf-certifications/mcda-certified-cyber-defense-analyst.html) | ||
- **Exam Registration**: Contact Mosse Institute for details on registration and pricing. |
67 changes: 67 additions & 0 deletions
67
...s/mosse-institute/certified-cyber-defense-infrastructure-support-specialist.mdx
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,67 @@ | ||
--- | ||
title: "MCDISS - Certified Cyber Defense Infrastructure Support Specialist" | ||
acronym: "MCDISS" | ||
last_updated_at: 2024-09-30 | ||
image: "../../../assets/dcwf-cyber-defense-infrastructure-support-specialist.png" | ||
reference: "https://www.mosse-institute.com/dcwf-certifications/mcdiss-certified-cyber-defense-infrastructure-support-specialist.html" | ||
aliases: | ||
- "Certified Cyber Defense Infrastructure Support Specialist" | ||
draft: false | ||
career_paths: | ||
- "Blue Team Specialist" | ||
- "Cybersecurity Manager" | ||
- "Security Operations Specialist" | ||
price: "1295" | ||
currency: "$" | ||
--- | ||
|
||
# {frontmatter.title} ({frontmatter.acronym}) | ||
|
||
## Overview | ||
|
||
The **MCDISS - Certified Cyber Defense Infrastructure Support Specialist** certification is designed to provide | ||
professionals with the essential skills needed to secure and support critical IT infrastructure. This course emphasizes | ||
both theoretical knowledge and practical application, focusing on defense strategies in the cybersecurity domain. | ||
|
||
The certification validates an individual’s ability to: | ||
|
||
- Secure Windows and Linux servers and computers. | ||
- Implement automated tools and scripts for system security. | ||
- Apply best practices for cybersecurity in real-world scenarios. | ||
|
||
## Course Details | ||
|
||
The MCDISS certification program covers comprehensive defense strategies, enabling participants to bridge the gap | ||
between theory and practice. The hands-on learning environment ensures that learners gain valuable experience in | ||
implementing effective cybersecurity measures. | ||
|
||
### Topics Covered: | ||
|
||
- Fundamentals of securing server environments (Windows and Linux). | ||
- Manual techniques and automated tools for system security. | ||
- Best practices for maintaining a secure infrastructure. | ||
- Practical tasks that prepare participants to respond to evolving cyber threats. | ||
|
||
## Exam Structure | ||
|
||
The MCDISS certification is awarded upon successful completion of a practical exam that assesses the candidate's ability | ||
to apply cybersecurity principles in real-world infrastructure scenarios. | ||
|
||
### Key Exam Requirements: | ||
|
||
- Practical exercises simulating typical cybersecurity challenges. | ||
- Documentation of security measures implemented during the exam. | ||
|
||
## Who Should Take MCDISS? | ||
|
||
The MCDISS certification is ideal for: | ||
|
||
- Blue team specialists looking to enhance their skills in infrastructure security. | ||
- Cybersecurity managers aiming to improve their team's capabilities in defending IT systems. | ||
- Security operations specialists focused on maintaining secure environments. | ||
|
||
## Resources | ||
|
||
- **Certification Details | ||
**: [MCDISS Certification](https://www.mosse-institute.com/dcwf-certifications/mcdiss-certified-cyber-defense-infrastructure-support-specialist.html) | ||
- **Exam Registration**: Contact Mosse Institute for details on registration and pricing. |
Oops, something went wrong.