CompTIA Cybersecurity Analyst+: Threat Intelligence

Cybersecurity Analyst+    |    Intermediate
  • 14 videos | 48m 45s
  • Includes Assessment
  • Earns a Badge
Rating 4.6 of 188 users Rating 4.6 of 188 users (188)
Your organization's security posture is critical to its success-and security technicians must be aware of known and emerging security threats from a variety of sources. Learners begin this 14-video course by exploring various ways for security technicians to keep up-to-date and ahead of the curve. Examine various security intelligence sources and how to use the MITRE corporation's invaluable, trademarked ATT&CK knowledge base. Learners next discuss threat intelligence collection, threat classification for prioritization, and different sources and motivations of IT threats. Not sure what the bug bounty program is? Confused by false positives-mislabeled security alerts-and how to handle them? This course gives you the information you need. Become familiar with the Common Vulnerability Scoring System (CVSS), which provides a way to allocate or assign a score to a vulnerability: the higher the score, the bigger the threat. Then go on to examine the National Vulnerability Database (NVD). The course helps to prepare learners for CompTIA+ Cybersecurity Analyst+ (CySA+) CS0-002 certification exam.

WHAT YOU WILL LEARN

  • Discover the key concepts covered in this course
    Identify security intelligence sources
    Use the mitre att&ck knowledge base
    Collect and analyze threat intelligence data
    Organize threats by type to facilitate prioritization
    Recognize different sources and motivations for it threats
    Discuss the dark net
  • Install and use the tor browser
    Discuss true positives and negatives as well as false positives and negatives
    Manage threat indicators
    Identify and prioritize risk mitigation techniques
    Explore cvss severity levels
    Identify commonalities shared amongst bug bounties
    Summarize the key concepts covered in this course

IN THIS COURSE

  • 2m 4s
  • 4m 38s
    Learn how to identify sources of security intelligence. FREE ACCESS
  • Locked
    3.  MITRE ATT&CK
    5m 2s
    In this video, learn how to use the MITRE ATT&CK knowledge base. FREE ACCESS
  • Locked
    4.  Intelligence Collection
    3m 47s
    During this video, you will learn how to collect and analyze data related to potential threats. FREE ACCESS
  • Locked
    5.  Classifying Threats
    4m 32s
    In this video, you will organize threats by type to prioritize them. FREE ACCESS
  • Locked
    6.  Threat Actor Types
    3m 27s
    Upon completion of this video, you will be able to recognize different sources and motivations for IT threats. FREE ACCESS
  • Locked
    7.  The Dark Net
    4m 37s
    In this video, learn how to discuss the dark web. FREE ACCESS
  • Locked
    8.  The Tor Web Browser
    2m 13s
    In this video, you will learn how to install and use the Tor browser. FREE ACCESS
  • Locked
    9.  Threat Positives and Negatives
    4m 13s
    In this video, you will learn how to discuss true positives, true negatives, false positives, and false negatives. FREE ACCESS
  • Locked
    10.  Threat Indications
    3m 3s
    In this video, learn how to manage threat indicators. FREE ACCESS
  • Locked
    11.  Threat Modeling
    3m 14s
    Find out how to identify and prioritize risk mitigation techniques. FREE ACCESS
  • Locked
    12.  Common Vulnerability Scoring System
    3m 47s
    Learn how to explore CVSS severity levels. FREE ACCESS
  • Locked
    13.  Bug Bounties
    2m 46s
    In this video, learn how to identify commonalities shared by bug bounties. FREE ACCESS
  • Locked
    14.  Course Summary
    1m 21s

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE

Rating 5.0 of 1 users Rating 5.0 of 1 users (1)
Rating 4.6 of 30 users Rating 4.6 of 30 users (30)
Rating 5.0 of 4 users Rating 5.0 of 4 users (4)

PEOPLE WHO VIEWED THIS ALSO VIEWED THESE

Rating 4.6 of 7019 users Rating 4.6 of 7019 users (7019)
Rating 4.2 of 144 users Rating 4.2 of 144 users (144)
Rating 4.6 of 232 users Rating 4.6 of 232 users (232)