Security Operations and Monitoring for CompTIA CySA+
Offered By: Pluralsight
Course Description
Overview
Being proactive is key when it comes to protecting your resources This course will teach you to configure your resources to better protect them as well as what Indicators of Compromise (IoC) you should be monitoring.
How do you create a security profile for your company to stay ahead of attackers? In this course, Security Operations and Monitoring for CompTIA CySA+, you’ll learn to configure your resources to better protect them as well as what Indicators of Compromise (IoC) you should be monitoring. First, you’ll explore the basics of security monitoring. Next, you’ll discover how to setup and monitor the different types of nodes/system on your network. Finally, you’ll learn how to configure various security technologies to help harden your system, devices, and applications from attackers. When you’re finished with this course, you’ll have the skills and knowledge of a security analysist needed to configure your resources to better protect them as well as what Indicators of Compromise (IoC) you should be monitoring.
How do you create a security profile for your company to stay ahead of attackers? In this course, Security Operations and Monitoring for CompTIA CySA+, you’ll learn to configure your resources to better protect them as well as what Indicators of Compromise (IoC) you should be monitoring. First, you’ll explore the basics of security monitoring. Next, you’ll discover how to setup and monitor the different types of nodes/system on your network. Finally, you’ll learn how to configure various security technologies to help harden your system, devices, and applications from attackers. When you’re finished with this course, you’ll have the skills and knowledge of a security analysist needed to configure your resources to better protect them as well as what Indicators of Compromise (IoC) you should be monitoring.
Taught by
Dale Meredith
Related Courses
MongoDB for .NET DevelopersMongoDB University Web Application Development – Capstone Course
University of New Mexico via Coursera Ciberseguridad: ataques y contramedidas
Universidad Rey Juan Carlos via Independent Reliable Cloud Infrastructure: Design and Process auf Deutsch
Google Cloud via Coursera Securing and Integrating Components of your Application 日本語版
Google Cloud via Coursera