CompTIA Cybersecurity Analyst+: Threat Mitigation
Cyber Security
| Intermediate
- 12 videos | 1h 3m 4s
- Includes Assessment
- Earns a Badge
Threat mitigation aims to eliminate or reduce risk of potential negative impact on IT systems. Explore the SDLC, penetration testing, and how to mitigate threats.
WHAT YOU WILL LEARN
-
Identify sdlc phasesApply secure coding practicesProperly test technology solutions for securityReduce the attack surface of a network hostRecognize the importance of keeping hardware and software up to dateApply patches properly to secure network hosts
-
Set the correct access to file systems while adhering to the principle of least privilegeRecognize the purpose of controlling network access with nacRecognize the purpose of network segregation using vlansIdentify various conditions that control access to resourcesRecognize the purpose of intentionally creating vulnerable hosts to monitor malicious useRecognize the purpose of a jump box
IN THIS COURSE
-
5m 43sIn this video, you will identify the SDLC phases. FREE ACCESS
-
6m 15sLearn how to apply secure coding practices. FREE ACCESS
-
5m 27sIn this video, you will learn how to properly test technology solutions for security. FREE ACCESS
-
7m 27sIn this video, find out how to reduce the attack surface of a network host. FREE ACCESS
-
5m 16sUpon completion of this video, you will be able to recognize the importance of keeping hardware and software up to date. FREE ACCESS
-
5m 18sIn this video, learn how to apply patches properly to secure network hosts. FREE ACCESS
-
4m 8sDuring this video, you will learn how to set the correct access to file systems while following the principle of least privilege. FREE ACCESS
-
6m 25sAfter completing this video, you will be able to recognize the purpose of controlling network access with Network Access Control (NAC). FREE ACCESS
-
5mUpon completion of this video, you will be able to recognize the purpose of network segregation using virtual LANs. FREE ACCESS
-
5m 26sFind out how to identify various conditions that restrict access to resources. FREE ACCESS
-
3m 6sAfter completing this video, you will be able to recognize the purpose of intentionally creating vulnerable hosts to monitor malicious use. FREE ACCESS
-
3m 35sUpon completion of this video, you will be able to recognize the purpose of a jump box. FREE ACCESS
EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE
Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.
Digital badges are yours to keep, forever.