SecOps Engineer: Threat Mitigation
IT Security
| Intermediate
- 13 videos | 56m 59s
- Includes Assessment
- Earns a Badge
This course explores the general concepts of threat mitigation for SecOps (security and operations) engineers. In this 13 videos, learners will observe the three basic concepts for threat mitigation and threat intelligence: identification, prevention, and responses. This course examines acceptable risk levels. You will analyze malware classification, such as viruses, worms, logic bombs, and backdoor software. You will learn to mitigation malware, and threats to websites; and examine types of ransomware, including Cryptolocker, Cryptowall, WannaCry, and Bad Rabbit, as well as explore possible solutions. You will learn how DoS (denial of service) is conducted, and see examples of specific attacks; then examine cross-Site Scripting, parameter traversal, and cross-Site Request Forgery. You will learn to address insider threats, and how to mitigate social engineering, phishing, and insecure protocols. Learners will examine how to integrate analysis into mitigating these threats. Finally, this course explores cyberthreat intelligence, and suggests that you subscribe to the National Vulnerability Database, and its feeds.
WHAT YOU WILL LEARN
-
Discover the key concepts covered in this courseDescribe and integrate threat mitigation concepts into security operationsAnalyze and mitigate malware threatsDescribe approaches to ransomware mitigationDescribe threats to websitesRespond effectively to dos attacksAnalyze the danger of insider threats and take mitigating steps
-
Integrate mitigation for social engineering into security operationsDescribe the threats posed by phishing and integrate mitigation steps into security operationsDescribe the threat of using insecure protocols and how to mitigate that threatUse cyberthreat intelligence and integrate it into mitigation strategiesUse cyberthreat intelligence resources effectivelySummarize the key concepts covered in this course
IN THIS COURSE
-
1m 26s
-
4m 11sAfter completing this video, you will be able to describe and integrate security operations into threat mitigation concepts. FREE ACCESS
-
5m 56sDuring this video, you will learn how to analyze and reduce malware threats. FREE ACCESS
-
5m 55sUpon completion of this video, you will be able to describe approaches to ransomware prevention. FREE ACCESS
-
6m 1sAfter completing this video, you will be able to describe threats to websites. FREE ACCESS
-
6m 53sIn this video, learn how to effectively respond to DoS attacks. FREE ACCESS
-
5m 6sIn this video, you will learn how to analyze the danger of insider threats and take steps to mitigate them. FREE ACCESS
-
4m 44sIn this video, learn how to integrate mitigation for social engineering into security operations. FREE ACCESS
-
3m 18sAfter completing this video, you will be able to describe the threats posed by phishing and integrate mitigation steps into security operations. FREE ACCESS
-
3m 45sUpon completion of this video, you will be able to describe the threat of using insecure protocols and how to mitigate that threat. FREE ACCESS
-
3m 2sIn this video, you will learn how to use cyberthreat intelligence and integrate it into mitigation strategies. FREE ACCESS
-
5m 51sIn this video, you will learn how to use cyberthreat intelligence resources effectively. FREE ACCESS
-
52sLearn how to summarize the key concepts covered in this course. FREE ACCESS
EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE
Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.
Digital badges are yours to keep, forever.