SecOps Engineer: Threat Mitigation

IT Security    |    Intermediate
  • 13 videos | 56m 59s
  • Includes Assessment
  • Earns a Badge
Rating 4.6 of 18 users Rating 4.6 of 18 users (18)
This course explores the general concepts of threat mitigation for SecOps (security and operations) engineers. In this 13 videos, learners will observe the three basic concepts for threat mitigation and threat intelligence: identification, prevention, and responses. This course examines acceptable risk levels. You will analyze malware classification, such as viruses, worms, logic bombs, and backdoor software. You will learn to mitigation malware, and threats to websites; and examine types of ransomware, including Cryptolocker, Cryptowall, WannaCry, and Bad Rabbit, as well as explore possible solutions. You will learn how DoS (denial of service) is conducted, and see examples of specific attacks; then examine cross-Site Scripting, parameter traversal, and cross-Site Request Forgery. You will learn to address insider threats, and how to mitigate social engineering, phishing, and insecure protocols. Learners will examine how to integrate analysis into mitigating these threats. Finally, this course explores cyberthreat intelligence, and suggests that you subscribe to the National Vulnerability Database, and its feeds.

WHAT YOU WILL LEARN

  • Discover the key concepts covered in this course
    Describe and integrate threat mitigation concepts into security operations
    Analyze and mitigate malware threats
    Describe approaches to ransomware mitigation
    Describe threats to websites
    Respond effectively to dos attacks
    Analyze the danger of insider threats and take mitigating steps
  • Integrate mitigation for social engineering into security operations
    Describe the threats posed by phishing and integrate mitigation steps into security operations
    Describe the threat of using insecure protocols and how to mitigate that threat
    Use cyberthreat intelligence and integrate it into mitigation strategies
    Use cyberthreat intelligence resources effectively
    Summarize the key concepts covered in this course

IN THIS COURSE

  • 1m 26s
  • 4m 11s
    After completing this video, you will be able to describe and integrate security operations into threat mitigation concepts. FREE ACCESS
  • Locked
    3.  General Malware Threats
    5m 56s
    During this video, you will learn how to analyze and reduce malware threats. FREE ACCESS
  • Locked
    4.  Ransomware Threats
    5m 55s
    Upon completion of this video, you will be able to describe approaches to ransomware prevention. FREE ACCESS
  • Locked
    5.  Website Threats
    6m 1s
    After completing this video, you will be able to describe threats to websites. FREE ACCESS
  • Locked
    6.  Denial of Service Threats
    6m 53s
    In this video, learn how to effectively respond to DoS attacks. FREE ACCESS
  • Locked
    7.  Insider Threats
    5m 6s
    In this video, you will learn how to analyze the danger of insider threats and take steps to mitigate them. FREE ACCESS
  • Locked
    8.  Social Engineering
    4m 44s
    In this video, learn how to integrate mitigation for social engineering into security operations. FREE ACCESS
  • Locked
    9.  Phishing Threats
    3m 18s
    After completing this video, you will be able to describe the threats posed by phishing and integrate mitigation steps into security operations. FREE ACCESS
  • Locked
    10.  Insecure Protocols
    3m 45s
    Upon completion of this video, you will be able to describe the threat of using insecure protocols and how to mitigate that threat. FREE ACCESS
  • Locked
    11.  Cyberthreat Intelligence
    3m 2s
    In this video, you will learn how to use cyberthreat intelligence and integrate it into mitigation strategies. FREE ACCESS
  • Locked
    12.  Using Cyberthreat Intelligence Resources
    5m 51s
    In this video, you will learn how to use cyberthreat intelligence resources effectively. FREE ACCESS
  • Locked
    13.  Course summary
    52s
    Learn how to summarize the key concepts covered in this course. FREE ACCESS

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE

Rating 4.9 of 13 users Rating 4.9 of 13 users (13)
Rating 4.5 of 33 users Rating 4.5 of 33 users (33)

PEOPLE WHO VIEWED THIS ALSO VIEWED THESE

Rating 4.2 of 322 users Rating 4.2 of 322 users (322)
Rating 4.5 of 1341 users Rating 4.5 of 1341 users (1341)
Rating 4.4 of 27 users Rating 4.4 of 27 users (27)