Course Details

Previous Page


CompTIA Cybersecurity Analyst+ CS0-001: Threat Mitigation


Overview/Description
Target Audience
Prerequisites
Expected Duration
Lesson Objectives
Course Number



Overview/Description
Applying security best practices to IT system creation and deployment can go a long way in reducing the attack surface. In this course, you will learn about the SDLC, penetration testing, how to mitigate threats, and the security frameworks on which these countermeasure are based.

Target Audience
IT specialists who will be responsible for securing and analyzing IT assets at the hardware and software levels

Prerequisites
None

Expected Duration (hours)
2.2

Lesson Objectives

CompTIA Cybersecurity Analyst+ CS0-001: Threat Mitigation

  • start the course
  • identify SDLC phases
  • apply secure coding practices
  • properly test technology solutions for security
  • reduce the attack surface of a network host
  • recognize the importance of keeping hardware and software up to date
  • apply patches properly to secure network hosts
  • set the correct access to file systems while adhering to the principle of least privilege
  • recognize the purpose of controlling network access with NAC
  • recognize the purpose of network segregation using VLANs
  • identify various conditions that control access to resources
  • recognize the purpose of intentionally creating vulnerable hosts to monitor malicious use
  • recognize the purpose of a jump box
  • explain how proper IT governance results in secured IT resources
  • recognize how regulatory compliance can influence security controls
  • apply NIST's Cybersecurity Framework to your digital assets
  • apply ISO security standards to harden your environment
  • recognize how the TOGAF enterprise IT architecture can increase efficiency of security controls
  • recognize how to assess risk and apply effective security controls to mitigate that risk
  • recognize how to apply ITIL to increase the efficiency of IT service delivery
  • identify physical security controls
  • identify logical security controls
  • configure router ACL rules to block ICMP traffic
  • identify administrative security controls
  • identify compensating security controls
  • recognize the importance of continuous monitoring
  • explain how firmware must be accredited before universal trust is established
  • identify factors related to conducting penetration tests
  • list categories of security controls and threat mitigations
  • Course Number:
    cs_cybs_a03_it_enus

    ITIL® is a registered trade mark of AXELOS Limited. Used under licence of AXELOS Limited. All rights reserved.