CompTIA Cybersecurity Analyst+: Security & Network Monitoring
Cybersecurity
| Intermediate
- 12 videos | 1h 36s
- Includes Assessment
- Earns a Badge
SIEM solutions serve as centralized data ingestion and analysis engines that seek out potential security issues. Security incident response can be partially or fully automated using SOAR solutions. In this course, discover the benefits of security information and event management (SIEM) and security orchestration, automation, and response (SOAR) security incident monitoring and response solutions. Next, explore threat positives and negatives, followed by deploying the Splunk SIEM on Linux. Finally, learn how to configure a Splunk universal forwarder and use various tools to capture and analyze network traffic. This course can be used to prepare for the CS0-003: CompTIA Cybersecurity Analyst+ exam.
WHAT YOU WILL LEARN
-
Discover the key concepts covered in this courseRecall how a siem solution serves as a central ingestion point for security analysis in a security operations center (soc)Identify how a soar solution serves as a method of automating security incident remediationOutline true positives and negatives as well as false positives and negativesDeploy splunk on linuxConfigure linux log forwarding to splunk
-
Query splunk indexesUse tcpdump to capture network trafficUse wireshark to capture network trafficAnalyze an ics network traffic captureRecognize the role that ai and ml play in threat huntingSummarize the key concepts covered in this course
IN THIS COURSE
-
1m 4sIn this video, we will discover the key concepts covered in this course. FREE ACCESS
-
5m 41sDuring this video, you will learn how to recall how a SIEM solution serves as a central ingestion point for security analysis in a security operations center (SOC). FREE ACCESS
-
7m 36sUpon completion of this video, you will be able to identify how a SOAR solution serves as a method of automating security incident remediation. FREE ACCESS
-
4m 9sIn this video, we will outline true positives and negatives as well as false positives and negatives. FREE ACCESS
-
6m 25sDuring this video, discover how to deploy Splunk on Linux. FREE ACCESS
-
6m 42sIn this video, find out how to configure Linux log forwarding to Splunk. FREE ACCESS
-
5m 39sDuring this video, you will learn how to query Splunk indexes. FREE ACCESS
-
5m 35sDiscover how to use tcpdump to capture network traffic. FREE ACCESS
-
6m 12sIn this video, learn how to use Wireshark to capture network traffic. FREE ACCESS
-
6m 27sFind out how to analyze an ICS network traffic capture. FREE ACCESS
-
4m 24sAfter completing this video, you will be able to recognize the role that AI and ML play in threat hunting. FREE ACCESS
-
42sIn this video, we will summarize the key concepts covered in this course. FREE ACCESS
EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE
Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.
Digital badges are yours to keep, forever.