Security Operations and Monitoring for CompTIA CySA+
Offered By: Pluralsight
Course Description
Overview
Being proactive is key when it comes to protecting your resources This course will teach you to configure your resources to better protect them as well as what Indicators of Compromise (IoC) you should be monitoring.
How do you create a security profile for your company to stay ahead of attackers? In this course, Security Operations and Monitoring for CompTIA CySA+, you’ll learn to configure your resources to better protect them as well as what Indicators of Compromise (IoC) you should be monitoring. First, you’ll explore the basics of security monitoring. Next, you’ll discover how to setup and monitor the different types of nodes/system on your network. Finally, you’ll learn how to configure various security technologies to help harden your system, devices, and applications from attackers. When you’re finished with this course, you’ll have the skills and knowledge of a security analysist needed to configure your resources to better protect them as well as what Indicators of Compromise (IoC) you should be monitoring.
How do you create a security profile for your company to stay ahead of attackers? In this course, Security Operations and Monitoring for CompTIA CySA+, you’ll learn to configure your resources to better protect them as well as what Indicators of Compromise (IoC) you should be monitoring. First, you’ll explore the basics of security monitoring. Next, you’ll discover how to setup and monitor the different types of nodes/system on your network. Finally, you’ll learn how to configure various security technologies to help harden your system, devices, and applications from attackers. When you’re finished with this course, you’ll have the skills and knowledge of a security analysist needed to configure your resources to better protect them as well as what Indicators of Compromise (IoC) you should be monitoring.
Taught by
Dale Meredith
Related Courses
Mobile Devices in Everyday LifeTallinn University via EMMA Windows Support Essentials: Maintenance
Microsoft via edX Advanced IOT Applications
Indian Institute of Science Bangalore via Swayam Computer Fundamentals: Security
Pluralsight Integrating AWS IoT Core in Your Application
Pluralsight