Host-based Analysis for Cisco CyberOps Associate
Offered By: Pluralsight
Course Description
Overview
Cybersecurity concepts are fundamental pieces of knowledge necessary for a career in the industry. This course will detail many aspects of host-based technologies, components, and threats.
There is a tremendous need around understanding and implementing SOC operations in the cybersecurity sector of IT, and is hindering operations within organizations. In this course, Host-based Analysis for Cisco CyberOps Associate, you’ll learn some of the foundational concepts needed to start your journey into the SOC operations realm. First, you’ll explore endpoint technologies and telemetry. Then, you’ll peer into different operating systems to identify key components for investigations. After that, you’ll learn about evidence and forensic imaging. Finally, you’ll learn how to utilize malware analysis tools to identify important elements for investigations. When you’re finished with this course, you’ll be one step closer to having a solid understanding of cybersecurity concepts and be able to continue learning how to identify problems and perform tasks in a SOC environment.
There is a tremendous need around understanding and implementing SOC operations in the cybersecurity sector of IT, and is hindering operations within organizations. In this course, Host-based Analysis for Cisco CyberOps Associate, you’ll learn some of the foundational concepts needed to start your journey into the SOC operations realm. First, you’ll explore endpoint technologies and telemetry. Then, you’ll peer into different operating systems to identify key components for investigations. After that, you’ll learn about evidence and forensic imaging. Finally, you’ll learn how to utilize malware analysis tools to identify important elements for investigations. When you’re finished with this course, you’ll be one step closer to having a solid understanding of cybersecurity concepts and be able to continue learning how to identify problems and perform tasks in a SOC environment.
Syllabus
- Course Overview 1min
- Describing Endpoint Security Technologies 25mins
- Identifying Key Operating System Components 24mins
- Collecting Forensic Images and Evidence 20mins
- Interpreting Malware Analysis Results 22mins
- Domain Summary 2mins
Taught by
Pluralsight
Related Courses
Computer SecurityStanford University via Coursera Cryptography II
Stanford University via Coursera Malicious Software and its Underground Economy: Two Sides to Every Story
University of London International Programmes via Coursera Building an Information Risk Management Toolkit
University of Washington via Coursera Introduction to Cybersecurity
National Cybersecurity Institute at Excelsior College via Canvas Network