CompTIA Cybersecurity Analyst+: Analyzing Malicious Activity
Cybersecurity
| Beginner
- 9 videos | 43m 35s
- Includes Assessment
- Earns a Badge
Malware mitigation techniques include the deployment, configuration, and ongoing management of virus and threat endpoint protection. Online tools such as VirusTotal can be used to upload suspicious files that might contain malware. Cybersecurity technicians must be able to determine the authenticity of email messages as well as create sandbox environments for testing configurations. In this course, you will begin by configuring Windows virus and threat protection and uploading a potentially infected file to VirusTotal. Next, you will determine when to use cloud-based and on-premises malware analysis solutions like Joe Sandbox and Cuckoo Sandbox. Then you will view email details in an effort to determine message authenticity and you will create a repeatable compliant environment using Azure Blueprints. Finally, you will learn how to work with user virtual private networks (VPNs) and the Tor web browser and find out how bug bounties offer rewards for the identification of flaws in hardware and software. This course can be used to prepare for the CS0-003: CompTIA Cybersecurity Analyst+ exam.
WHAT YOU WILL LEARN
-
Discover the key concepts covered in this courseConfigure microsoft windows virus and threat protectionUse the virustotal website for analyzing files and urlsDetermine when to use cloud-based and on-premises malware analysis solutionsUse various techniques to determine the authenticity of email messages
-
Create a repeatable compliant virtual cloud sandbox using azure blueprintsUse virtual private networks (vpns) for anonymity and install and use the tor browserRecall how bug bounties offer rewards for the identification of flaws in hardware and softwareSummarize the key concepts covered in this course
IN THIS COURSE
-
1m 17sIn this video, we will discover the key concepts covered in this course. FREE ACCESS
-
7m 39sLearn how to configure Microsoft Windows virus and threat protection. FREE ACCESS
-
4m 47sFind out how to use the VirusTotal website for analyzing files and URLs. FREE ACCESS
-
4m 48sAfter completing this video, you will be able to determine when to use cloud-based and on-premises malware analysis solutions. FREE ACCESS
-
5m 56sDuring this video, discover how to use various techniques to determine the authenticity of email messages. FREE ACCESS
-
7m 49sIn this video, find out how to create a repeatable compliant virtual cloud sandbox using Azure Blueprints. FREE ACCESS
-
5m 56sDuring this video, you will learn how to use virtual private networks (VPNs) for anonymity and install and use the Tor browser. FREE ACCESS
-
4m 30sUpon completion of this video, you will be able to recall how bug bounties offer rewards for the identification of flaws in hardware and software. FREE ACCESS
-
53sIn this video, we will summarize the key concepts covered in this course. FREE ACCESS
EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE
Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.
Digital badges are yours to keep, forever.