CRISC 2023: Threat Intelligence
CRISC
| Intermediate
- 11 videos | 55m 59s
- Includes Assessment
- Earns a Badge
Risk analysts and security tools can reference a variety of threat intelligence sources to keep up to date with the latest threats and mitigations. These can be used to help keep organization security policies as effective as possible. In this course, you will examine different threat intelligence sources such as the common vulnerabilities and exposures (CVEs) website. Then you will explore how the Open Web Application Security Project (OWASP) Top 10 can help harden vulnerable web applications. You will discover how artificial intelligence (AI) and machine learning (ML) are used in threat hunting. Next, you will investigate threat positives and negatives, as well as how advanced persistent threats (APTs) are executed. Finally, you will focus on the Cyber Kill Chain and learn how to detect threats using Amazon GuardDuty. This course can be used to prepare for the ISACA(r) Certified in Risk and Information Systems Control (CRISC(r)) certification.
WHAT YOU WILL LEARN
-
Discover the key concepts covered in this courseIdentify common threat intelligence sourcesView common cves and incorporate them into a security programRecognize the importance of the open web application security project (owasp) top 10 when hardening web applicationsDescribe the importance of detecting anomalies and potential indicators of compromiseRecognize the role that ai and ml play in threat hunting
-
Outline true positives and negatives as well as false positives and negativesIdentify how apts are executedEstablish a security model to detect, prevent, and lessen the impact of cybersecurity eventsEnable amazon guardduty threat detection and examine sample findingsSummarize the key concepts covered in this course
IN THIS COURSE
-
1m 6sIn this video, we will discover the key concepts covered in this course. FREE ACCESS
-
6m 40sLearn how to identify common threat intelligence sources. FREE ACCESS
-
5m 35sIn this video, you will view common CVEs and incorporate them into a security program. FREE ACCESS
-
8m 23sAfter completing this video, you will be able to recognize the importance of the Open Web Application Security Project (OWASP) Top 10 when hardening web applications. FREE ACCESS
-
6m 45sUpon completion of this video, you will be able to describe the importance of detecting anomalies and potential indicators of compromise. FREE ACCESS
-
4m 25sAfter completing this video, you will be able to recognize the role that AI and ML play in threat hunting. FREE ACCESS
-
4m 47sUpon completion of this video, you will be able to outline true positives and negatives as well as false positives and negatives. FREE ACCESS
-
5m 50sAfter completing this video, you will be able to identify how APTs are executed. FREE ACCESS
-
5m 28sUpon completion of this video, you will be able to establish a security model to detect, prevent, and lessen the impact of cybersecurity events. FREE ACCESS
-
5m 58sIn this video, discover how to enable Amazon GuardDuty threat detection and examine sample findings. FREE ACCESS
-
1m 2sIn this video, we will summarize the key concepts covered in this course. FREE ACCESS
EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE
Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.
Digital badges are yours to keep, forever.