Aspire Journeys
212 Cyber Defense Forensics Analyst Basic KSAT Journey
- 33 Courses | 42h 24m 16s
Cyber Defense Forensics Analysts analyze digital evidence and investigates computer security incidents to derive useful information in support of system/network vulnerability mitigation.
212 Cyber Defense Forensics Analyst
Cyber Defense Forensics Analysts analyze digital evidence and investigates computer security incidents to derive useful information in support of system/network vulnerability mitigation.
- 33 Courses | 42h 24m 16s
COURSES INCLUDED
Agile Organizations: Cloud for Agile Software Development
The cloud has various deployment and service models that can be combined with Agile software development methodologies to help your organization design and create your very own cloud strategy based on your organization's needs. In this course, you'll learn about Agile software development, cloud management, cloud identity and access management, the cloud physical infrastructure, the cloud logical infrastructure, and cloud privacy. Next, you'll examine the available cloud deployment models such as public, private, hybrid, community, and virtual public clouds, as well as multi-cloud and multitenancy environments. You'll then move on to explore cloud service models such as Infrastructure as a Service, Platform as a Service, and Software as a Service. Finally, you'll learn about advanced topics such the Internet of Things.
14 videos |
1h 18m
Assessment
Badge
Microsoft Azure Fundamentals: Cloud Computing
The popularity of cloud computing has exploded in recent years. Organizations can streamline IT service efficiency with the use of cloud services in Microsoft Azure. In this course, explore five standard cloud computing characteristics: on-demand self-service, broad network access, resource pooling, rapid elasticity, and measured service. Discover cloud deployment models like public, hybrid, and community, and look at cloud service models including Infrastructure as a Service (IaaS), Platform as a Service (PaaS), and Software as a Service (SaaS). Examine core Azure items, such as data centers, regions, and availability zones. Finally, focus on using Azure Arc to manage on-premises and multi-cloud environments. This course can be used to prepare for exam AZ-900, Microsoft Azure Fundamentals.
11 videos |
1h
Assessment
Badge
Defining Cloud Computing for Decision-makers: Cloud Computing Principles
The cloud has various deployment and service models that can help an organization design their very own cloud strategy based on their needs. In this course, you'll learn about components of cloud computing including storage, compute, data management, monitoring, code management, and process and deployment management. Investigate cloud deployment models (public, private, hybrid, and community) and serverless architectures such as Backend as a Service (BaaS) and Function as a Service (FaaS). Explore cloud service models such as Infrastructure as a Service, Platform as a Service, and Software as a Service and discover common use cases for each. Finally, learn about cloud deployment architectures and security considerations including lack of control, data breaches, and compliance. After course completion, you'll be able to recognize cloud deployment and service models and key cloud security considerations.
15 videos |
1h 40m
Assessment
Badge
CompTIA IT Fundamentals: Basic IT Concepts
Computers are an integral part of our lives, both personally and professionally. In a few short decades, they have become so indispensable that understanding how they work and how to use them has become imperative. In this course, you will be introduced to basic information technology (IT) concepts, beginning with common numbering systems used by computers and the two international data standards. Then you will explore the character and numerical data types used in computer programming. Finally, you will learn about the basics of computer processing, inputs and outputs, the role of computer storage, and how it works. This course helps prepare learners for the CompTIA IT Fundamentals (ITF+) certification exam, FC0-U61.
15 videos |
1h 49m
Assessment
Badge
CompTIA IT Fundamentals: Data, CPUs, & Troubleshooting
What goes on under the hood of computers is a marvel of human ingenuity that most people don't stop to consider, even though computers are never far away in our professional or private lives. In this course, you will explore the basics of data, CPUs, and troubleshooting, beginning with an overview of data and information as assets, intellectual property and digital products, and data-driven business decisions. Then you will discover processors, data storage measurements, and throughput measurements. Finally, you will focus on troubleshooting, including the methodology used for preventing, detecting, and remedying the problem. This course helps prepare learners for the CompTIA IT Fundamentals (ITF+) certification exam, FC0-U61.
18 videos |
1h 59m
Assessment
Badge
CompTIA IT Fundamentals: Computer Devices & Components
By modern standards, computer setups are no longer as simple as requiring a box, keyboard, mouse, and monitor. Other peripherals in the past were optional and not nearly as common as they are now. In this course, explore concepts for computer devices and components, such as the basics of computer networking. Next, learn about various peripherals, including setup steps and installation methods. Finally, examine the insides of computers with an overview of motherboards, BIOS and firmware, CPUs and RAM, storage types, cooling systems, and network interface cards (NICs). This course helps prepare learners for the CompTIA IT Fundamentals (ITF+) certification exam, FC0-U61.
17 videos |
2h 41m
Assessment
Badge
CompTIA IT Fundamentals: Internet, Storage, & Computer Systems
When computers first hit the scene, they were a marvel and a mystery to most individuals, but accessibility improvements over time allowed them to become moderately more useful. They then began to extraordinarily change the world with the advent of the Internet. In this course, discover the role and features of the Internet, storage, and computer systems, beginning with the various Internet connection technologies and computer storage types. Next, learn about the various types of computers and the features of mobile phones, tablet devices, and gaming systems. Finally, explore an overview of the Internet of Things (IoT) and the technological advances that enable IoT. This course helps prepare learners for the CompTIA IT Fundamentals (ITF+) certification exam, FC0-U61.
14 videos |
1h 29m
Assessment
Badge
CompTIA IT Fundamentals: Operating Systems
Computers need software to function, and that software has changed fundamentally since the very first computers were created. Nowadays, sophisticated operating systems (OSs) are used to perform everyday tasks. In this course, learn about computer operating systems, including the types and basic features of OSs and the application hardware interface. Next, explore Windows management, including managing applications, devices, users, and access control. Finally, investigate file systems, key OS features, task scheduling, and common methods for tweaking a Windows OS, including using command line interfaces (CLIs) to perform operations. This course helps prepare learners for the CompTIA IT Fundamentals (ITF+) certification exam, FC0-U61.
18 videos |
2h 24m
Assessment
Badge
CompTIA IT Fundamentals: CIA Triad
Computer data is created at a rate that we can barely comprehend. Much of that information is immensely useful and readily available to anyone, but there is a large contingent of information that is and should remain confidential. In this course, you will explore the CIA triad, beginning with the principle of least privilege and concerns surrounding confidentiality, integrity, and availability. Then you will learn about methods for protecting information, including antivirus and antimalware software, firewalls, password security, and safe browsing. Finally, you will discover the importance of patching and updates, best practices for device security, and removing unwanted software. This course helps prepare learners for the CompTIA IT Fundamentals (ITF+) certification exam, FC0-U61.
17 videos |
1h 43m
Assessment
Badge
CompTIA A+ Core 1: Cloud Computing Concepts
Cloud computing allows users to store and access data and programs over the internet instead of a local hard drive. In this course, explore cloud computing concepts such as cloud model types, resource sharing, measure service, and virtual desktops. Discover the features of Infrastructure as a Service (IaaS), Software as a Service (SaaS), and Platform as a Service (PaaS); and learn how to differentiate between public, private, hybrid, and community cloud infrastructures. Discover key differences between internal and external shared resources and explore rapid elasticity, a feature that allows for scalable provisioning. Finally, examine the considerations and benefits of using a measured service or a metered service and investigate the types of virtual desktops and their purposes. This course will prepare learners for the CompTIA A+ Core 1 (220-1101) certification.
11 videos |
1h 17m
Assessment
Badge
CompTIA A+ Core 2: Desktop, Server, & Mobile Operating Systems
Technicians must be aware of the features and installation requirements of various types of operating systems. Use this course to learn about common OS types and how to perform OS installations and upgrades in a diverse OS environment. Begin by exploring the features of Windows, Linux, macOS, ChromeOS, and mobile device operating systems. Discover available OS installation options and plan an operating system deployment strategy after reviewing various installation methods. Finally, perform the installation of a Windows 10, Windows Server 2019, Ubuntu Linux, and macOS system. Once you have completed this course, you will be able to select the appropriate operating system for a given scenario and plan its deployment. This course will help you prepare for the CompTIA A+ Core 2 (220-1102) certification exam.
14 videos |
1h 18m
Assessment
Badge
CompTIA A+ Core 2: Linux, macOS, & Windows File Systems
New disk devices can be initialized as Master Boot Record (MBR) or GUID Partition Table (GPT) and can be formatted using different types of file systems. Use this course to become familiar with and learn how to manage common Linux, macOS, and Windows file systems. To start, explore common file system types including the New Technology File System (NTFS), File Allocation Table (FAT32), exFAT, ext3, ext4, and the Apple File System (APFS). Discover the difference between MBR and GPT disks and learn how to format and partition disks. You'll then work with NTFS, share, and Linux file system permissions to configure access for network shares and learn how to manage file systems using command line tools. Once you have completed this course, you will be able to choose the appropriate file system and management tools for specific situations. This course will help you prepare for the CompTIA A+ Core 2 (220-1102) certification exam.
12 videos |
1h 7m
Assessment
Badge
CompTIA A+ Core 2: Operating System & Network Management
Understanding the network connectivity options in modern operating systems is a vital skill you need as a technician. In this course, you will explore various GUI management tools that can be used when working in Windows. Learn to navigate and configure Control Panel settings and discover how to utilize networking commands in Windows and Linux, and management tools for macOS. Next, you will review how IP addressing, DNS, and DHCP works and observe how to configure Windows DNS and DHCP servers. Finally, learn how to manage various network settings, including those related to Windows Defender and Microsoft Active Directory. Upon completion of this course, you'll be able to use command-line management tools and manage network-related settings in Windows, Linux, and the macOS. This course will help you prepare for the CompTIA A+ Core 2 (220-1102) certification exam.
16 videos |
1h 50m
Assessment
Badge
CompTIA A+ Core 2: Malware Detection, Removal, & Prevention
Malware is software designed with malicious intent that often aims to disrupt, enable unauthorized access, or cause end-user access interference. In this course, you'll learn how to detect, remove, and prevent malware using the appropriate tools and methods. Begin by exploring the various types of malware including trojans, rootkits, viruses, spyware, ransomware, keyloggers, boot sector viruses, and cryptominers. Become familiar with the recovery console and recognize when to perform an operating system reinstallation as a result of malware. Next, learn how to differentiate between anti-virus and anti-malware solutions and discover how software firewalls can help secure a device. Lastly, discover the importance of end-user training and education as it relates to malware and other cyber threats. After completing this course you'll know how to detect, remove, and prevent malware using the appropriate tools and methods. This course is part of a series used to prepare for the CompTIA A+ Core 2 (220-1102) certification exam.
14 videos |
1h 41m
Assessment
Badge
CompTIA A+ Core 2: Backup & Recovery Methods
Backing up data is the practice of copying data from a primary to a secondary location. Regular backups are essential when attempting to recover from a primary data failure. Backups should be performed regularly in both personal and business scenarios. In this course, explore disaster prevention techniques and recovery best practices. Discover how to differentiate between full, incremental, differential, and synthetic backups, and learn when to implement each method. Next, explore backup frequency timelines that can help ensure regular data backups. Discover how to differentiate between on-site and off-site backup rotation schemes, and lastly, explore backup rotation schemes including grandfather-father-son (GFS) and the 3-2-1 backup rule. This course is part of a series that will help you prepare for the CompTIA A+ Core 2 (220-1102) certification exam.
7 videos |
46m
Assessment
Badge
CompTIA Cybersecurity Analyst+: Analyzing Malicious Activity
Malware mitigation techniques include the deployment, configuration, and ongoing management of virus and threat endpoint protection. Online tools such as VirusTotal can be used to upload suspicious files that might contain malware. Cybersecurity technicians must be able to determine the authenticity of email messages as well as create sandbox environments for testing configurations. In this course, you will begin by configuring Windows virus and threat protection and uploading a potentially infected file to VirusTotal. Next, you will determine when to use cloud-based and on-premises malware analysis solutions like Joe Sandbox and Cuckoo Sandbox. Then you will view email details in an effort to determine message authenticity and you will create a repeatable compliant environment using Azure Blueprints. Finally, you will learn how to work with user virtual private networks (VPNs) and the Tor web browser and find out how bug bounties offer rewards for the identification of flaws in hardware and software. This course can be used to prepare for the CS0-003: CompTIA Cybersecurity Analyst+ exam.
9 videos |
43m
Assessment
Badge
Malware Removal: Identifying Malware Types & Classification Approaches
Knowing how to respond to malware incidents is a critical skill for security professionals, and the first step to achieving malware response skills is understanding the types of malware you will face in the field. In this course, you'll explore different types of malware such as worms, Trojan viruses, botnets, ransomware, and rootkits. You'll then round out your knowledge by identifying the different methods used to classify a virus and determine its potential impact.
8 videos |
26m
Assessment
Badge
Malware Removal: Analyzing an Infected System
Familiarization with the different types of malware analysis and the tools used to analyze malware is a critical skill for IT security professionals. In this course, you'll explore the characteristics of malware and the impact the malware has on the infected system. You'll learn how to identify different malware analysis techniques, such as static and dynamic malware analysis, to discover activities performed by malware. You'll also examine some of the tools used to perform both static and dynamic malware analysis and how to use a disassembler to view malware code.
13 videos |
1h 44m
Assessment
Badge
Security Programming: System Essentials
In this 14-video course, learners will explore how Linux-based systems operate, communicate, and manage the underlying information they contain. Begin by examining management and monitoring tools available in Unix and Linux environments. Then learn to work with user accounts and domain names, and learn how to monitor user and system activity. You will learn how to securely connect to remote servers by using secure shell (SSH), and how to work with user accounts. This course examines elements of both an Internet Protocol routing table and a network interface, and demonstrates how to perform Domain Name System lookups. Learners will examine log files for monitoring critical events on a Linux system and use the PS command to retrieve process information. You will learn how to retrieve disk usage, partition information, and directory contents of a Linux system, and how to monitor both user and system activity on a Linux system. Finally, this course demonstrates how to configure time and date services and explore system configurations in the /etc folder of a Unix system.
14 videos |
56m
Assessment
Badge
Windows Exploits and Forensics: Intelligence Gathering
As a security operations person, you'll need to employ various Windows exploitation techniques to attack vulnerable target software and services. This course covers the various intelligence gathering techniques used for conducting offensive security operations against a Windows-based network to identify possible vulnerabilities. You'll start by examining open source intelligence (OSINT) gathering techniques and sources before conducting your own OSINT investigation. Next, you'll explore the use of social media and other tools for finding targets for social engineering exercises. You'll then examine common Windows services and their ports and tools for conducting basic enumeration. Moving along, you'll practice network scanning for open ports, scanning a Windows-based system, and enumerating data. Lastly, you'll explore various tools used in the Kali hacking environment, the use of Metasploitable, and common locations to find Windows exploits.
13 videos |
1h 27m
Assessment
Badge
Windows Environments
As a security operations person, you'll need to tailor your methods to suit the operating system your working with. This course covers some of the core competencies required to conduct offensive security operations against a Windows environment. Throughout this course, you'll learn how to recognize the differences between various Windows versions. You'll examine the role of intrusion detection systems (IDS) and intrusion prevention systems (IPS) in a Windows environment. You'll then learn about the MITRE ATT&CK framework and how it relates to Windows intrusions and identify the different Windows logging mechanisms. Next, you'll practice using event logging, basic PowerShell commands, and the Windows Registry. You'll then explore how the Windows hashing algorithm works and practice cracking an NTLM hash value. Lastly, you'll investigate different data artifacts within Windows and outline how best to work with Active Directory and Kerberos.
16 videos |
1h 31m
Assessment
Badge
Cloud Data Platforms: Cloud Computing
Cloud computing has revolutionized the way we build, deploy, and maintain applications. Due to this paradigm shift, many businesses now rent rather than own IT infrastructure. This new way of approaching infrastructure requirements has given way to multiple cloud computing models, such as Software as a Service (SaaS), Platform as a Service (PaaS), Infrastructure as a Service (IaaS), and Function as a Service (FaaS). Knowing what your options are for cloud computing can help you choose the best models for your needs. Use this course to gain a solid foundational understanding of cloud computing. Compare various cloud service providers based on services, available tools, and pricing. Learn about real-life use cases for cloud computing and how businesses can benefit from this ever-evolving technological feat. When you've completed this course, your newfound knowledge of cloud computing will help you decide how it can help your business.
12 videos |
46m
Assessment
Badge
CyberOps Windows Hardening: Windows Server Hardening Best Practices
Windows servers are the heart of many corporate networks and may contain sensitive company data that, if leaked or stolen by an attacker, would be catastrophic. Protecting the Windows Server assets and preventing a security compromise is an important skill for IT security professionals to master. In this course, you'll learn how to help prevent security incidents by hardening the Windows Server and reducing the attack surface. You'll learn how to follow common security best practices to lock down a Windows system by hardening user accounts, passwords, services, the file system, and common network services, such as DNS and IIS.
16 videos |
1h 32m
Assessment
Badge
Information Security for Leaders: An Introduction to InfoSec
Information security, often called InfoSec, consists of tools and processes used to protect data and sensitive information from threats and attacks. In this course, explore the history of information security and discover how to differentiate between cybersecurity and information security. Discover common myths and misconceptions about information security and learn about types of information security, such as infrastructure, cloud, application, and incident response. Next, you will explore security threats, including social media attacks, social engineering, malware, and misconfigurations, and common information security and data protection laws. Finally, you will investigate the responsibilities of a Chief Information Security Officer (CISO), including developing sound security practices, identifying security objectives, conducting awareness and training programs, and ensuring regulatory compliance. Upon completion, you'll be able to recognize the importance of information security and the key roles and responsibilities required to protect an organization
15 videos |
1h 18m
Assessment
Badge
Managing Enterprise InfoSec Risks & Risk Tolerance
IT security risks can be defined as a combination of the consequences of an event and the associated likelihood of occurrence. They can be managed by an organization through asset-safeguarding strategies. Through this course, learn about managing enterprise information security (InfoSec) risk and risk tolerance. Explore the definition of risk, how it differs from threats and vulnerabilities, and the history of information security. Next, discover common threats to IT systems and data, how to identify and manage security risks, and the key differences between quantitative and qualitative risk analysis. Finally, learn about common risk assessment tools and the differences between penetration testing and vulnerability assessments. Upon completion, you'll be able to outline and manage IT security risks.
15 videos |
1h 44m
Assessment
Badge
InfoSec Crisis Management & Incident Response
Not only do IT security teams need to be ready to identify security incidents, but they also need to be able to respond to and manage the environment during a crisis. In this course, you'll explore the term 'crisis' and identify crisis management practices. Discover the key components of an organizational crisis readiness program, including planning, training, technology, tools, and continuous improvement. Next, investigate the roles and responsibilities of a crisis management team, examine measures to minimize disruptions, and determine how incident response planning can help organizations better respond to critical incidents. Then, investigate how to best identify incidents and learn how early detection of incidents can be crucial to containing threats. Lastly, explore the various steps of a typical incident response plan, focusing on identification, containment, investigation, eradication, recovery, and lessons learned. After completing this course, you will be able to recognize what constitutes a crisis and respond to and manage security incidents.
15 videos |
1h 34m
Assessment
Badge
Information Security Practices: Multi-year InfoSec Planning
There is no easy way to predict the future of information security. There are however strategies leaders can implement to better plan and prepare for future growth, security, and threats. In this course, examine potential information security threats, how complexity makes them challenging to predict and plan for, and the threats that ransomware, cybercrime, and the growing crime-as-a-service (CaaS) community pose. Next, discover how work shortages and voids created by skills gaps can cause major issues and the impact of recent global pandemics. Finally, explore operational technology, application container risks, and the evolving risks posed by artificial intelligence and machine learning. Upon completion, you'll be able to plan for the future as an InfoSec leader.
15 videos |
1h 17m
Assessment
Badge
Certified in Cybersecurity (CC): Core Security Principles & Risk Management
It is of high importance that organizations operate upon a solid foundation of security principles, concepts, and risk management. It is impossible to reduce security risk until core security and risk management principles are defined. In this course, explore the elements of the confidentiality, integrity, and availability (CIA) triad, along with the essentials of authentication and using non-repudiation services. Next, examine what risk is and the terminology surrounding risk management, threats, and vulnerability. Finally, learn about risk assessment, identification, and treatment and compare qualitative and quantitative risk analysis. This course prepares learners for the (ISC)2 Certified in Cybersecurity exam.
11 videos |
32m
Assessment
Badge
Certified in Cybersecurity (CC): Security Governance, Policies, & Controls
Security governance is a huge part of overall corporate or organizational governance. The security practitioner must be aware of various governance elements, regulations, laws, standards, policies, and procedures. Begin this course by exploring the elements of governance, including mission charter, leadership, and corporate guidance. Then investigate various laws and regulations like General Data Protection Regulation (GDPR) and HIPAA, standards issued by the International Organization for Standardization and International Electrotechnical Commission (ISO/IEC), and the National Institute of Standards and Technology (NIST), and common policies and standard operating procedures. Next, examine the International Information System Security Certification Consortium (ISC2) code of ethics. Finally, discover security control categories and types. This course prepares learners for the (ISC)2 Certified in Cybersecurity exam.
10 videos |
25m
Assessment
Badge
Certified in Cybersecurity (CC): Incident Response
Practically anything that occurs in the enterprise can be called an event, but not all events are negative occurrences. It is the problematic events that are managed with the incident response practice. In this course, you will begin by exploring incident terminology and the goal of incident response. Next, discover the phases of the incident response lifecycle: Preparation, Detection and Analysis, Containment, and Post-incident Activities. Finally, you will explore additional incident response topics, including incident response teams, forensics, and problem management. This course prepares learners for the (ISC)2 Certified in Cybersecurity exam.
10 videos |
28m
Assessment
Badge
Certified in Cybersecurity (CC): Business Continuity Planning
Many organizations nowadays have become aware of the need for business continuity planning, also known as continuity of operations. The main objective of a business continuity plan (BCP) is for an organization to maintain organizational operations while recovering from a major interruption. In this course, explore the importance and goals of business continuity and continuity of operations, as well as the components of a business continuity plan. Next, learn about business impact analysis (BIA), backup and restore policies, and disaster recovery plans. Finally, investigate the various tests and drills that incident response and business continuity plans should be subjected to. This course prepares learners for the (ISC)2 Certified in Cybersecurity exam.
10 videos |
30m
Assessment
Badge
Certified in Cybersecurity (CC): Networking & Security Infrastructure
Although new security practitioners can come from development, database, or other backgrounds, the majority of security professionals come from a networking background. It is virtually impossible to separate networking knowledge from security expertise. Begin this course by exploring network types, network devices, and device addressing mechanisms. Then you will discover the Open Systems Interconnection (OSI) and Transmission Control Protocol/Internet Protocol (TCP/IP) reference models, logical ports, and the TCP handshake. Next, you will focus on transport layer security (TLS) and IP security (IPsec). Finally, you will examine virtual LANs (VLANs) and Wi-Fi fundamentals. This course prepares learners for the (ISC)2 Certified in Cybersecurity exam.
12 videos |
45m
Assessment
Badge
Certified in Cybersecurity (CC): Data Security & System Hardening
For many organizations, data is the most critical asset to be secured. Begin this course by exploring the data life cycle, or the different phases a piece of data goes through, from data creation to data destruction. You will focus on each of the six phases, including create, store, use, share, archive, and destroy. Then, you will learn how to log and monitor security events using modern enterprise and cloud-based solutions. Next, you will investigate encryption, hashing, and digital signing. Finally, you will discover system hardening practices like patch management. This course prepares learners for the (ISC)2 Certified in Cybersecurity exam.
11 videos |
29m
Assessment
Badge
EARN A DIGITAL BADGE WHEN YOU COMPLETE THESE TRACKS
Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.
Digital badges are yours to keep, forever.