Security Operations and Monitoring for CompTIA CySA+
Offered By: Pluralsight
Course Description
Overview
Being proactive is key when it comes to protecting your resources This course will teach you to configure your resources to better protect them as well as what Indicators of Compromise (IoC) you should be monitoring.
How do you create a security profile for your company to stay ahead of attackers? In this course, Security Operations and Monitoring for CompTIA CySA+, you’ll learn to configure your resources to better protect them as well as what Indicators of Compromise (IoC) you should be monitoring. First, you’ll explore the basics of security monitoring. Next, you’ll discover how to setup and monitor the different types of nodes/system on your network. Finally, you’ll learn how to configure various security technologies to help harden your system, devices, and applications from attackers. When you’re finished with this course, you’ll have the skills and knowledge of a security analysist needed to configure your resources to better protect them as well as what Indicators of Compromise (IoC) you should be monitoring.
How do you create a security profile for your company to stay ahead of attackers? In this course, Security Operations and Monitoring for CompTIA CySA+, you’ll learn to configure your resources to better protect them as well as what Indicators of Compromise (IoC) you should be monitoring. First, you’ll explore the basics of security monitoring. Next, you’ll discover how to setup and monitor the different types of nodes/system on your network. Finally, you’ll learn how to configure various security technologies to help harden your system, devices, and applications from attackers. When you’re finished with this course, you’ll have the skills and knowledge of a security analysist needed to configure your resources to better protect them as well as what Indicators of Compromise (IoC) you should be monitoring.
Taught by
Dale Meredith
Related Courses
An Introduction to Computer NetworksStanford University via Independent Computer Networks
University of Washington via Coursera Computer Networking
Georgia Institute of Technology via Udacity Cybersecurity and Its Ten Domains
University System of Georgia via Coursera Model Building and Validation
AT&T via Udacity