Cisco CyberOps: Exploring Security Concepts
Offered By: Pluralsight
Course Description
Overview
Cybersecurity concepts are fundamental pieces of knowledge necessary to have a career in the industry. This course will explore security concepts to ensure that a solid foundation is laid for future knowledge.
There is a tremendous skill shortage in the cybersecurity sector of IT that is hindering operations at organizations. In this course, Cisco CyberOps: Exploring Security Concepts, you’ll learn the some of the foundational concepts needed to start your journey into the SOC operations realm. First, you’ll explore common cybersecurity terminology and how it’s used within organizations. Next, you’ll learn about cybersecurity components and concepts, as well as pieces within your network that serve to provide different aspects of security in the organization. Finally, you’ll discover how to identify cybersecurity problems and how to isolate compromised hosts using logging. When you’re finished with this course, you’ll be one step closer to having a solid understanding of cybersecurity concepts and be able to continue learning how to identify problems and perform tasks in a SOC environment.
There is a tremendous skill shortage in the cybersecurity sector of IT that is hindering operations at organizations. In this course, Cisco CyberOps: Exploring Security Concepts, you’ll learn the some of the foundational concepts needed to start your journey into the SOC operations realm. First, you’ll explore common cybersecurity terminology and how it’s used within organizations. Next, you’ll learn about cybersecurity components and concepts, as well as pieces within your network that serve to provide different aspects of security in the organization. Finally, you’ll discover how to identify cybersecurity problems and how to isolate compromised hosts using logging. When you’re finished with this course, you’ll be one step closer to having a solid understanding of cybersecurity concepts and be able to continue learning how to identify problems and perform tasks in a SOC environment.
Taught by
Joe Abraham
Related Courses
Computer SecurityStanford University via Coursera Cryptography II
Stanford University via Coursera Malicious Software and its Underground Economy: Two Sides to Every Story
University of London International Programmes via Coursera Building an Information Risk Management Toolkit
University of Washington via Coursera Introduction to Cybersecurity
National Cybersecurity Institute at Excelsior College via Canvas Network