CompTIA Cybersecurity Analyst+: Threat Intelligence
Cybersecurity
| Intermediate
- 12 videos | 1h 9m 5s
- Includes Assessment
- Earns a Badge
Cybersecurity analysts and security tools can reference a variety of threat intelligence sources to keep up to date with the latest threats and mitigations. These can be used to help keep organization security policies as effective as possible. In this course, examine different threat intelligence sources, the common vulnerabilities and exposures (CVEs) website, and the MITRE ATT&CK knowledge base. Next, discover how the OWASP Top 10 can help harden vulnerable web applications, how advanced persistent threats (APTs) are executed, and common ISO/IEC standards. Finally, learn how to analyze CIS benchmark documents, the Common Vulnerability Scoring System (CVSS), common organization security policy structures, and how organizational culture relates to IT security. This course can be used to prepare for the CS0-003: CompTIA Cybersecurity Analyst+ (CySA+) exam.
WHAT YOU WILL LEARN
-
Discover the key concepts covered in this courseIdentify common threat intelligence sourcesView common cves and incorporate them into a security programUse the mitre att&ck knowledge baseRecognize the importance of the owasp top 10 when hardening web applicationsIdentify how apts are executed
-
Outline how iso/iec standards can result in proper it governanceDownload and analyze center for internet security (cis) benchmark documentationUse the common vulnerability scoring system (cvss) to describe it security threatsList various types of security policiesOutline how to ensure effective security governance through security awareness and business executive involvementSummarize the key concepts covered in this course
IN THIS COURSE
-
1m 33sIn this video, we will discover the key concepts covered in this course. FREE ACCESS
-
6m 45sUpon completion of this video, you will be able to identify common threat intelligence sources. FREE ACCESS
-
5m 57sIn this video, find out how to view common CVEs and incorporate them into a security program. FREE ACCESS
-
7m 41sDuring this video, discover how to use the MITRE ATT&CK knowledge base. FREE ACCESS
-
10m 58sIn this video, you will recognize the importance of the OWASP Top 10 when hardening web applications. FREE ACCESS
-
6m 14sAfter completing this video, you will be able to identify how APTs are executed. FREE ACCESS
-
5m 17sUpon completion of this video, you will be able to outline how ISO/IEC standards can result in proper IT governance. FREE ACCESS
-
5m 19sIn this video, learn how to download and analyze Center for Internet Security (CIS) benchmark documentation. FREE ACCESS
-
5m 31sDiscover how to use the Common Vulnerability Scoring System (CVSS) to describe IT security threats. FREE ACCESS
-
6m 57sAfter completing this video, you will be able to list various types of security policies. FREE ACCESS
-
5m 54sUpon completion of this video, you will be able to outline how to ensure effective security governance through security awareness and business executive involvement. FREE ACCESS
-
59sIn this video, we will summarize the key concepts covered in this course. FREE ACCESS
EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE
Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.
Digital badges are yours to keep, forever.