CompTIA Cybersecurity Analyst+: Analyzing Malicious Activity

Cybersecurity    |    Beginner
  • 9 videos | 43m 35s
  • Includes Assessment
  • Earns a Badge
Rating 5.0 of 1 users Rating 5.0 of 1 users (1)
Malware mitigation techniques include the deployment, configuration, and ongoing management of virus and threat endpoint protection. Online tools such as VirusTotal can be used to upload suspicious files that might contain malware. Cybersecurity technicians must be able to determine the authenticity of email messages as well as create sandbox environments for testing configurations. In this course, you will begin by configuring Windows virus and threat protection and uploading a potentially infected file to VirusTotal. Next, you will determine when to use cloud-based and on-premises malware analysis solutions like Joe Sandbox and Cuckoo Sandbox. Then you will view email details in an effort to determine message authenticity and you will create a repeatable compliant environment using Azure Blueprints. Finally, you will learn how to work with user virtual private networks (VPNs) and the Tor web browser and find out how bug bounties offer rewards for the identification of flaws in hardware and software. This course can be used to prepare for the CS0-003: CompTIA Cybersecurity Analyst+ exam.

WHAT YOU WILL LEARN

  • Discover the key concepts covered in this course
    Configure microsoft windows virus and threat protection
    Use the virustotal website for analyzing files and urls
    Determine when to use cloud-based and on-premises malware analysis solutions
    Use various techniques to determine the authenticity of email messages
  • Create a repeatable compliant virtual cloud sandbox using azure blueprints
    Use virtual private networks (vpns) for anonymity and install and use the tor browser
    Recall how bug bounties offer rewards for the identification of flaws in hardware and software
    Summarize the key concepts covered in this course

IN THIS COURSE

  • 1m 17s
    In this video, we will discover the key concepts covered in this course. FREE ACCESS
  • 7m 39s
    Learn how to configure Microsoft Windows virus and threat protection. FREE ACCESS
  • Locked
    3.  Using the VirusTotal Website
    4m 47s
    Find out how to use the VirusTotal website for analyzing files and URLs. FREE ACCESS
  • Locked
    4.  Using Joe Sandbox and Cuckoo Sandbox
    4m 48s
    After completing this video, you will be able to determine when to use cloud-based and on-premises malware analysis solutions. FREE ACCESS
  • Locked
    5.  Analyzing Suspicious Email Messages
    5m 56s
    During this video, discover how to use various techniques to determine the authenticity of email messages. FREE ACCESS
  • Locked
    6.  Creating a Microsoft Azure Blueprint
    7m 49s
    In this video, find out how to create a repeatable compliant virtual cloud sandbox using Azure Blueprints. FREE ACCESS
  • Locked
    7.  Using Internet User VPNs and the Tor Web Browser
    5m 56s
    During this video, you will learn how to use virtual private networks (VPNs) for anonymity and install and use the Tor browser. FREE ACCESS
  • Locked
    8.  Using Bug Bounties
    4m 30s
    Upon completion of this video, you will be able to recall how bug bounties offer rewards for the identification of flaws in hardware and software. FREE ACCESS
  • Locked
    9.  Course Summary
    53s
    In this video, we will summarize the key concepts covered in this course. FREE ACCESS

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE

Rating 5.0 of 3 users Rating 5.0 of 3 users (3)
Rating 4.6 of 30 users Rating 4.6 of 30 users (30)
Rating 5.0 of 4 users Rating 5.0 of 4 users (4)

PEOPLE WHO VIEWED THIS ALSO VIEWED THESE

Rating 5.0 of 4 users Rating 5.0 of 4 users (4)
Rating 5.0 of 2 users Rating 5.0 of 2 users (2)
Rating 5.0 of 2 users Rating 5.0 of 2 users (2)