CompTIA Cybersecurity Analyst+: Secure Coding & Digital Forensics

Cybersecurity    |    Intermediate
  • 10 videos | 55m 49s
  • Includes Assessment
  • Earns a Badge
Rating 5.0 of 1 users Rating 5.0 of 1 users (1)
Security must be included in all phases of IT system and software development designs. Continuous integration and continuous delivery/deployment (CI/CD) integrates development and ongoing management of IT solutions. Cybersecurity analysts must understand IT governance and digital forensics concepts. Begin this course by examining the role of security in the software development life cycle (SDLC). Then you will explore CI/CD and learn how Git is used for file version control. Next, you will discover how the Control Objectives for Information and Related Technologies (COBIT) framework applies to IT governance and you will investigate digital forensics. Finally, you will configure legal hold settings for a cloud storage account and list common digital forensics hardware and software solutions. This course can be used to prepare for the CS0-003: CompTIA Cybersecurity Analyst+ exam.

WHAT YOU WILL LEARN

  • Discover the key concepts covered in this course
    Recognize how security applies to all sdlc phases
    Define the importance of ci/cd
    Recognize how git is used for file version control
    Outline how the control objectives for information and related technologies (cobit) framework applies to it governance
  • Recognize the importance of securing evidence both during and after collection
    Configure legal hold settings for a microsoft azure storage account
    List common digital forensic hardware and software solutions
    Use the autopsy tool for digital forensics
    Summarize the key concepts covered in this course

IN THIS COURSE

  • 1m 17s
    In this video, we will discover the key concepts covered in this course. FREE ACCESS
  • 6m 25s
    After completing this video, you will be able to recognize how security applies to all SDLC phases. FREE ACCESS
  • Locked
    3.  Continuous Integration and Continuous Deployment (CI/CD)
    5m 10s
    During this video, you will learn how to define the importance of CI/CD. FREE ACCESS
  • Locked
    4.  Git and Version Control
    5m 9s
    Upon completion of this video, you will be able to recognize how Git is used for file version control. FREE ACCESS
  • Locked
    5.  COBIT and IT Governance
    6m 13s
    After completing this video, you will be able to outline how the Control Objectives for Information and Related Technologies (COBIT) framework applies to IT governance. FREE ACCESS
  • Locked
    6.  Chain of Custody
    6m 28s
    Upon completion of this video, you will be able to recognize the importance of securing evidence both during and after collection. FREE ACCESS
  • Locked
    7.  Configuring Immutable Blob Storage
    6m 55s
    In this video, find out how to configure legal hold settings for a Microsoft Azure storage account. FREE ACCESS
  • Locked
    8.  Digital Forensics Hardware and Software
    8m 26s
    After completing this video, you will be able to list common digital forensic hardware and software solutions. FREE ACCESS
  • Locked
    9.  Using Autopsy for Digital Forensics Discovery
    8m 50s
    During this video, discover how to use the Autopsy tool for digital forensics. FREE ACCESS
  • Locked
    10.  Course Summary
    57s
    In this video, we will summarize the key concepts covered in this course. FREE ACCESS

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE

Rating 4.4 of 17 users Rating 4.4 of 17 users (17)
Rating 4.8 of 6 users Rating 4.8 of 6 users (6)
Rating 5.0 of 2 users Rating 5.0 of 2 users (2)

PEOPLE WHO VIEWED THIS ALSO VIEWED THESE

Rating 5.0 of 1 users Rating 5.0 of 1 users (1)
Rating 5.0 of 1 users Rating 5.0 of 1 users (1)
Rating 5.0 of 2 users Rating 5.0 of 2 users (2)