CompTIA Cybersecurity Analyst+: Threat Monitoring
Cybersecurity Analyst+
| Intermediate
- 15 videos | 1h 9m 7s
- Includes Assessment
- Earns a Badge
In this course, you'll learn about centralized monitoring for on-premises and cloud solutions and how this results in the timely response to business disruptions and highlights indicators of compromise. You'll examine continuous monitoring, log types, cloud logging and auditing, centralized Linux logging, Windows event log filtering, and cloud alarms. You'll also learn about the OSI model, network traffic analysis, filtering captured network traffic, e-mail monitoring, honeypots, and SIEM. This course can be used in preparation for the CompTIA Cybersecurity Analyst (CySA+) certification exam CS0-002.
WHAT YOU WILL LEARN
-
Discover the key concepts covered in this courseLink continuous monitoring with quick security incident response timesDescribe the relevance of common log typesView cloud-based audit eventsSend linux log events to a centralized logging hostFilter windows logs to show only relevant log entriesConfigure a cloud-based alarm when a vm cpu usage threshold is exceededList how the 7 layers of the osi model relate to communications hardware and software
-
Describe common items to look out for when analyzing network trafficFilter captured network trafficList common items to look out for when monitoring an e-mail ecosystemRecognize where honeypots can be used to monitor malicious activityRecognize how siem provides centralized security event monitoring and managementRecognize how to filter out noise to identify suspicious activitySummarize the key concepts covered in this course
IN THIS COURSE
-
2m 16s
-
6m 7sIn this video, find out how to link continuous monitoring with quick security incident response times. FREE ACCESS
-
6m 5sAfter completing this video, you will be able to describe the relevance of common log types. FREE ACCESS
-
2m 48sIn this video, you will view audit events that are based in the cloud. FREE ACCESS
-
6mIn this video, learn how to send Linux log events to a centralized logging server. FREE ACCESS
-
5m 12sIn this video, you will filter Windows logs to show only the relevant log entries. FREE ACCESS
-
2m 26sFind out how to configure a cloud-based alarm when a VM CPU usage threshold is exceeded. FREE ACCESS
-
7m 40sUpon completion of this video, you will be able to list how the 7 layers of the OSI model relate to communications hardware and software. FREE ACCESS
-
5m 11sAfter completing this video, you will be able to describe common items to look for when analyzing network traffic. FREE ACCESS
-
7m 9sIn this video, you will learn how to filter captured network traffic. FREE ACCESS
-
4m 47sUpon completion of this video, you will be able to list common items to look for when monitoring an e-mail ecosystem. FREE ACCESS
-
5m 9sUpon completion of this video, you will be able to recognize where honeypots can be used to monitor malicious activity. FREE ACCESS
-
3m 1sAfter completing this video, you will be able to recognize how SIEM provides centralized security event monitoring and management. FREE ACCESS
-
3m 48sUpon completion of this video, you will be able to recognize how to filter out noise to identify suspicious activity. FREE ACCESS
-
1m 27s
EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE
Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.
Digital badges are yours to keep, forever.