Cisco CyberOps: Security Monitoring
Offered By: Pluralsight
Course Description
Overview
Cybersecurity concepts are fundamental pieces of knowledge necessary to have a career in the industry. This course will detail many aspects of cyber attacks, security monitoring and data visibility, and evasion techniques.
There is a tremendous skill shortage in the cybersecurity sector of IT that is hindering operations at organizations. In this course, Cisco CyberOps: Security Monitoring, you’ll learn some of the foundational concepts needed to start your journey into the SOC operations realm. First, you’ll explore attacks and how they can be used to infiltrate the assets. Next, you’ll learn about security monitoring and visibility, and how you can use the various data types to monitor your environment. You’ll understand how evasion and obfuscation techniques impact visibility. Finally, you’ll discover certificates and how they impact the security of the environment. When you’re finished with this course, you’ll be one step closer to having a solid understanding of cybersecurity concepts and be able to continue learning how to identify problems and perform tasks in a SOC environment.
There is a tremendous skill shortage in the cybersecurity sector of IT that is hindering operations at organizations. In this course, Cisco CyberOps: Security Monitoring, you’ll learn some of the foundational concepts needed to start your journey into the SOC operations realm. First, you’ll explore attacks and how they can be used to infiltrate the assets. Next, you’ll learn about security monitoring and visibility, and how you can use the various data types to monitor your environment. You’ll understand how evasion and obfuscation techniques impact visibility. Finally, you’ll discover certificates and how they impact the security of the environment. When you’re finished with this course, you’ll be one step closer to having a solid understanding of cybersecurity concepts and be able to continue learning how to identify problems and perform tasks in a SOC environment.
Taught by
Joe Abraham
Related Courses
Computer SecurityStanford University via Coursera Cryptography II
Stanford University via Coursera Malicious Software and its Underground Economy: Two Sides to Every Story
University of London International Programmes via Coursera Building an Information Risk Management Toolkit
University of Washington via Coursera Introduction to Cybersecurity
National Cybersecurity Institute at Excelsior College via Canvas Network