CompTIA Security+: Automation, Orchestration, & Incident Response

CompTIA Security+    |    Beginner
  • 10 videos | 48m 34s
  • Includes Assessment
  • Earns a Badge
Rating 4.5 of 2 users Rating 4.5 of 2 users (2)
Automation offers many advantages to information technology including higher production rates and increased productivity, more efficient use of resources, both physical and logical, better product/service quality, and improved security and safety. In this course, the learner will tackle concepts such as automation and scripting use cases, continuous integration and testing, application programming interfaces (APIs), the benefits of automation, automation considerations, the incident response process, training, testing, tabletop exercises, simulations, threat hunting, root cause analysis, digital forensics, and investigation data sources. This course is part of a series that prepares you for the CompTIA Security+ (SY0-701) exam.

WHAT YOU WILL LEARN

  • Discover the key concepts covered in this course
    Identify various automation and scripting use cases
    Recognize the benefits of automation, including efficiency/time saving, enforcing baselines, standard infrastructure configurations, scaling in a secure manner, employee retention, reaction time, and workforce multiplier
    Provide an overview of automation considerations such as complexity, cost, single point of failure, technical debt, and ongoing supportability
    Outline the incident response process, including preparation, detection, analysis, containment, eradication, recovery, and lessons learned
  • Define training and testing of incident response (ir) with techniques like tabletop exercises and simulations
    Provide an overview of threat hunting and root cause analysis
    Outline the digital forensics process with legal hold, chain of custody, acquisition, reporting, preservation, and e-discovery
    Outline the process of investigating data sources with firewall logs, application logs, endpoint logs, os-specific security logs, ips/ids logs, network logs, metadata, vulnerability scans, automated reports, dashboards, and packet captures
    Summarize the key concepts covered in this course

IN THIS COURSE

  • 38s
    In this video, we will discover the key concepts covered in this course. FREE ACCESS
  • 4m 18s
    After completing this video, you will be able to identify various automation and scripting use cases. FREE ACCESS
  • Locked
    3.  Benefits of Automation
    4m 23s
    Upon completion of this video, you will be able to recognize the benefits of automation, including efficiency/time saving, enforcing baselines, standard infrastructure configurations, scaling in a secure manner, employee retention, reaction time, and workforce multiplier. FREE ACCESS
  • Locked
    4.  Automation Considerations
    1m 54s
    After completing this video, you will be able to provide an overview of automation considerations such as complexity, cost, single point of failure, technical debt, and ongoing supportability. FREE ACCESS
  • Locked
    5.  Incident Response Process
    10m 37s
    Upon completion of this video, you will be able to outline the incident response process, including preparation, detection, analysis, containment, eradication, recovery, and lessons learned. FREE ACCESS
  • Locked
    6.  Training and Testing Incident Response (IR)
    4m 38s
    After completing this video, you will be able to define training and testing of incident response (IR) with techniques like tabletop exercises and simulations. FREE ACCESS
  • Locked
    7.  Threat Hunting and Root Cause Analysis
    6m 35s
    Upon completion of this video, you will be able to provide an overview of threat hunting and root cause analysis. FREE ACCESS
  • Locked
    8.  Digital Forensics
    8m 31s
    After completing this video, you will be able to outline the digital forensics process with legal hold, chain of custody, acquisition, reporting, preservation, and e-discovery. FREE ACCESS
  • Locked
    9.  Investigation of Data Sources
    6m 26s
    Upon completion of this video, you will be able to outline the process of investigating data sources with firewall logs, application logs, endpoint logs, OS-specific security logs, IPS/IDS logs, network logs, metadata, vulnerability scans, automated reports, dashboards, and packet captures. FREE ACCESS
  • Locked
    10.  Course Summary
    35s
    In this video, we will summarize the key concepts covered in this course. FREE ACCESS

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE

Rating 4.6 of 5 users Rating 4.6 of 5 users (5)
Rating 4.9 of 10 users Rating 4.9 of 10 users (10)
Rating 4.5 of 4 users Rating 4.5 of 4 users (4)