CompTIA Cybersecurity Analyst+: Threat Monitoring

Cybersecurity Analyst+    |    Intermediate
  • 15 videos | 1h 9m 7s
  • Includes Assessment
  • Earns a Badge
Rating 4.6 of 78 users Rating 4.6 of 78 users (78)
In this course, you'll learn about centralized monitoring for on-premises and cloud solutions and how this results in the timely response to business disruptions and highlights indicators of compromise. You'll examine continuous monitoring, log types, cloud logging and auditing, centralized Linux logging, Windows event log filtering, and cloud alarms. You'll also learn about the OSI model, network traffic analysis, filtering captured network traffic, e-mail monitoring, honeypots, and SIEM. This course can be used in preparation for the CompTIA Cybersecurity Analyst (CySA+) certification exam CS0-002.

WHAT YOU WILL LEARN

  • Discover the key concepts covered in this course
    Link continuous monitoring with quick security incident response times
    Describe the relevance of common log types
    View cloud-based audit events
    Send linux log events to a centralized logging host
    Filter windows logs to show only relevant log entries
    Configure a cloud-based alarm when a vm cpu usage threshold is exceeded
    List how the 7 layers of the osi model relate to communications hardware and software
  • Describe common items to look out for when analyzing network traffic
    Filter captured network traffic
    List common items to look out for when monitoring an e-mail ecosystem
    Recognize where honeypots can be used to monitor malicious activity
    Recognize how siem provides centralized security event monitoring and management
    Recognize how to filter out noise to identify suspicious activity
    Summarize the key concepts covered in this course

IN THIS COURSE

  • 2m 16s
  • 6m 7s
    In this video, find out how to link continuous monitoring with quick security incident response times. FREE ACCESS
  • Locked
    3.  Log Types
    6m 5s
    After completing this video, you will be able to describe the relevance of common log types. FREE ACCESS
  • Locked
    4.  Cloud Logging and Auditing
    2m 48s
    In this video, you will view audit events that are based in the cloud. FREE ACCESS
  • Locked
    5.  Centralized Linux Logging
    6m
    In this video, learn how to send Linux log events to a centralized logging server. FREE ACCESS
  • Locked
    6.  Windows Event Log Filtering
    5m 12s
    In this video, you will filter Windows logs to show only the relevant log entries. FREE ACCESS
  • Locked
    7.  Cloud Alarms
    2m 26s
    Find out how to configure a cloud-based alarm when a VM CPU usage threshold is exceeded. FREE ACCESS
  • Locked
    8.  OSI Model
    7m 40s
    Upon completion of this video, you will be able to list how the 7 layers of the OSI model relate to communications hardware and software. FREE ACCESS
  • Locked
    9.  Network Traffic Analysis
    5m 11s
    After completing this video, you will be able to describe common items to look for when analyzing network traffic. FREE ACCESS
  • Locked
    10.  Wireshark Traffic Filtering
    7m 9s
    In this video, you will learn how to filter captured network traffic. FREE ACCESS
  • Locked
    11.  E-mail Monitoring
    4m 47s
    Upon completion of this video, you will be able to list common items to look for when monitoring an e-mail ecosystem. FREE ACCESS
  • Locked
    12.  Honeypots
    5m 9s
    Upon completion of this video, you will be able to recognize where honeypots can be used to monitor malicious activity. FREE ACCESS
  • Locked
    13.  SIEM
    3m 1s
    After completing this video, you will be able to recognize how SIEM provides centralized security event monitoring and management. FREE ACCESS
  • Locked
    14.  Indicators of Compromise
    3m 48s
    Upon completion of this video, you will be able to recognize how to filter out noise to identify suspicious activity. FREE ACCESS
  • Locked
    15.  Course Summary
    1m 27s

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE

Rating 4.6 of 30 users Rating 4.6 of 30 users (30)
Rating 5.0 of 2 users Rating 5.0 of 2 users (2)
Rating 5.0 of 1 users Rating 5.0 of 1 users (1)

PEOPLE WHO VIEWED THIS ALSO VIEWED THESE

Rating 4.6 of 188 users Rating 4.6 of 188 users (188)
Rating 4.8 of 30 users Rating 4.8 of 30 users (30)
Rating 4.7 of 45 users Rating 4.7 of 45 users (45)