CompTIA Cybersecurity Analyst+: Threat Intelligence
Cybersecurity Analyst+
| Intermediate
- 14 videos | 48m 45s
- Includes Assessment
- Earns a Badge
Your organization's security posture is critical to its success-and security technicians must be aware of known and emerging security threats from a variety of sources. Learners begin this 14-video course by exploring various ways for security technicians to keep up-to-date and ahead of the curve. Examine various security intelligence sources and how to use the MITRE corporation's invaluable, trademarked ATT&CK knowledge base. Learners next discuss threat intelligence collection, threat classification for prioritization, and different sources and motivations of IT threats. Not sure what the bug bounty program is? Confused by false positives-mislabeled security alerts-and how to handle them? This course gives you the information you need. Become familiar with the Common Vulnerability Scoring System (CVSS), which provides a way to allocate or assign a score to a vulnerability: the higher the score, the bigger the threat. Then go on to examine the National Vulnerability Database (NVD). The course helps to prepare learners for CompTIA+ Cybersecurity Analyst+ (CySA+) CS0-002 certification exam.
WHAT YOU WILL LEARN
-
Discover the key concepts covered in this courseIdentify security intelligence sourcesUse the mitre att&ck knowledge baseCollect and analyze threat intelligence dataOrganize threats by type to facilitate prioritizationRecognize different sources and motivations for it threatsDiscuss the dark net
-
Install and use the tor browserDiscuss true positives and negatives as well as false positives and negativesManage threat indicatorsIdentify and prioritize risk mitigation techniquesExplore cvss severity levelsIdentify commonalities shared amongst bug bountiesSummarize the key concepts covered in this course
IN THIS COURSE
-
2m 4s
-
4m 38sLearn how to identify sources of security intelligence. FREE ACCESS
-
5m 2sIn this video, learn how to use the MITRE ATT&CK knowledge base. FREE ACCESS
-
3m 47sDuring this video, you will learn how to collect and analyze data related to potential threats. FREE ACCESS
-
4m 32sIn this video, you will organize threats by type to prioritize them. FREE ACCESS
-
3m 27sUpon completion of this video, you will be able to recognize different sources and motivations for IT threats. FREE ACCESS
-
4m 37sIn this video, learn how to discuss the dark web. FREE ACCESS
-
2m 13sIn this video, you will learn how to install and use the Tor browser. FREE ACCESS
-
4m 13sIn this video, you will learn how to discuss true positives, true negatives, false positives, and false negatives. FREE ACCESS
-
3m 3sIn this video, learn how to manage threat indicators. FREE ACCESS
-
3m 14sFind out how to identify and prioritize risk mitigation techniques. FREE ACCESS
-
3m 47sLearn how to explore CVSS severity levels. FREE ACCESS
-
2m 46sIn this video, learn how to identify commonalities shared by bug bounties. FREE ACCESS
-
1m 21s
EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE
Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.
Digital badges are yours to keep, forever.