CompTIA Cybersecurity Analyst+: Security & Network Monitoring

Cybersecurity    |    Intermediate
  • 12 videos | 1h 36s
  • Includes Assessment
  • Earns a Badge
Rating 5.0 of 3 users Rating 5.0 of 3 users (3)
SIEM solutions serve as centralized data ingestion and analysis engines that seek out potential security issues. Security incident response can be partially or fully automated using SOAR solutions. In this course, discover the benefits of security information and event management (SIEM) and security orchestration, automation, and response (SOAR) security incident monitoring and response solutions. Next, explore threat positives and negatives, followed by deploying the Splunk SIEM on Linux. Finally, learn how to configure a Splunk universal forwarder and use various tools to capture and analyze network traffic. This course can be used to prepare for the CS0-003: CompTIA Cybersecurity Analyst+ exam.

WHAT YOU WILL LEARN

  • Discover the key concepts covered in this course
    Recall how a siem solution serves as a central ingestion point for security analysis in a security operations center (soc)
    Identify how a soar solution serves as a method of automating security incident remediation
    Outline true positives and negatives as well as false positives and negatives
    Deploy splunk on linux
    Configure linux log forwarding to splunk
  • Query splunk indexes
    Use tcpdump to capture network traffic
    Use wireshark to capture network traffic
    Analyze an ics network traffic capture
    Recognize the role that ai and ml play in threat hunting
    Summarize the key concepts covered in this course

IN THIS COURSE

  • 1m 4s
    In this video, we will discover the key concepts covered in this course. FREE ACCESS
  • 5m 41s
    During this video, you will learn how to recall how a SIEM solution serves as a central ingestion point for security analysis in a security operations center (SOC). FREE ACCESS
  • Locked
    3.  Security Orchestration, Automation, and Response (SOAR)
    7m 36s
    Upon completion of this video, you will be able to identify how a SOAR solution serves as a method of automating security incident remediation. FREE ACCESS
  • Locked
    4.  Threat Positives and Negatives
    4m 9s
    In this video, we will outline true positives and negatives as well as false positives and negatives. FREE ACCESS
  • Locked
    5.  Deploying the Splunk SIEM
    6m 25s
    During this video, discover how to deploy Splunk on Linux. FREE ACCESS
  • Locked
    6.  Configuring a Splunk Universal Forwarder
    6m 42s
    In this video, find out how to configure Linux log forwarding to Splunk. FREE ACCESS
  • Locked
    7.  Using Splunk for Security Event Correlation
    5m 39s
    During this video, you will learn how to query Splunk indexes. FREE ACCESS
  • Locked
    8.  Capturing Network Traffic Using tcpdump
    5m 35s
    Discover how to use tcpdump to capture network traffic. FREE ACCESS
  • Locked
    9.  Capturing Network Traffic Using Wireshark
    6m 12s
    In this video, learn how to use Wireshark to capture network traffic. FREE ACCESS
  • Locked
    10.  Analyzing Industrial Control System (ICS) Network Traffic
    6m 27s
    Find out how to analyze an ICS network traffic capture. FREE ACCESS
  • Locked
    11.  Artificial Intelligence (AI) and Machine Learning (ML) in Threat Hunting
    4m 24s
    After completing this video, you will be able to recognize the role that AI and ML play in threat hunting. FREE ACCESS
  • Locked
    12.  Course Summary
    42s
    In this video, we will summarize the key concepts covered in this course. FREE ACCESS

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE

Rating 5.0 of 1 users Rating 5.0 of 1 users (1)
Rating 4.4 of 27 users Rating 4.4 of 27 users (27)
Rating 5.0 of 1 users Rating 5.0 of 1 users (1)

PEOPLE WHO VIEWED THIS ALSO VIEWED THESE

Rating 5.0 of 2 users Rating 5.0 of 2 users (2)
Rating 5.0 of 1 users Rating 5.0 of 1 users (1)
Rating 4.6 of 80 users Rating 4.6 of 80 users (80)