Networks are increasingly getting more and more complicated, and attackers count on this. In this course, Security Operations for CySA+, you’ll learn how to configure your resources for better security and how to keep an eye on Indicators of Compromise (IoC) to identify potential threats. First, you’ll explore the importance of system and network designs and concepts. Next, you’ll discover various indicators of attacks that you might experience. Finally, you’ll learn how to use various tools and techniques to evaluate how attackers will try to breach you. When you’re finished with this course, you’ll have the skills and knowledge of a Security Professional needed for the CySA+ Exam.
Overview
Networks are increasingly getting more and more complicated, and attackers count on this. In this course, Security Operations for CySA+, you’ll learn how to configure your resources for better security and how to keep an eye on Indicators of Compromise (IoC) to identify potential threats. First, you’ll explore the importance of system and network designs and concepts. Next, you’ll discover various indicators of attacks that you might experience. Finally, you’ll learn how to use various tools and techniques to evaluate how attackers will try to breach you. When you’re finished with this course, you’ll have the skills and knowledge of a Security Professional needed for the CySA+ Exam.
Syllabus
- Course Overview 1min
- Importance of System and Network Architectures 26mins
- Analyzing Indicators of Compromise 15mins
- Appropriate Tools to Identify Malicious Activities 31mins
- Differences between Threat Intelligence and Threat Hunting 13mins
- Importance of Efficiency and Process Improvements 9mins
- Domain Summary 1min
Taught by
Dale Meredith