YoVDO

Security Operations for CompTIA Security+

Offered By: Pluralsight

Tags

Security Operations Courses Data Analysis Courses Cybersecurity Courses Incident Response Courses Vulnerability Assessment Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
This course will teach you the essential foundations of sound security operations concepts along with the reasons why they’re important, both for real-world implementation and the Security+ exam.

A successful career in cyber security is built upon a strong foundation in security operations, and the platforms and elements that go into designing a secure environment. In this course, Security Operations for CompTIA Security+ , you'll learn the key elements to managing a secure environment. First, you’ll discover how to manage critical elements like setting baselines, managing hardware and software assets, monitoring and alerting, vulnerability assessments, and proper incident response. Finally, you’ll explore the concepts required to properly leverage data to support investigations. When you’re finished with this course, you’ll have the concepts and knowledge necessary for the Security+ exam.

Syllabus

  • Course Overview 1min
  • Applying Common Security Techniques to Computing Resources 29mins
  • Security Implications of Proper Hardware, Software, and Data Asset Management 24mins
  • Activities Associated with Vulnerability Management 33mins
  • Security Alerting and Monitoring Concepts and Tools 25mins
  • Modify Enterprise Capabilities to Enhance Security 30mins
  • Implement and Maintain Identity and Access Management 23mins
  • Importance of Automation and Orchestration Related to Secure Operations 22mins
  • Appropriate Incident Response Activities 34mins
  • Use Data Sources to Support an Investigation 11mins
  • Domain Summary 3mins

Taught by

Pluralsight

Related Courses

Evaluación de peligros y riesgos por fenómenos naturales
Universidad Nacional Autónoma de México via Coursera
Internet Security
openHPI
Planning a Security Incident Response
Microsoft via edX
Cyber Security
CEC via Swayam
Ethical Hacking
Indian Institute of Technology, Kharagpur via Swayam