Course Details

Previous Page


CompTIA Cybersecurity Analyst+ CS0-001: Monitoring for Security Issues


Overview/Description
Target Audience
Prerequisites
Expected Duration
Lesson Objectives
Course Number



Overview/Description
Hiring trustworthy and competent personnel is often overlooked when discussing IT security. Exploits take form not only as technical entities, but also as employee workplace violations. In this course, you'll also learn how to monitor and analyze various types of systems for audit and security purposes.

Target Audience
IT specialists who will be responsible for securing and analyzing IT assets at the hardware and software levels

Prerequisites
None

Expected Duration (hours)
2.3

Lesson Objectives

CompTIA Cybersecurity Analyst+ CS0-001: Monitoring for Security Issues

  • start the course
  • recognize proper hiring practices
  • provision new user accounts in accordance with organizational security policies
  • apply personnel management best practices
  • distinguish the difference between threats, vulnerabilities, and exploits
  • explain the concept of spoofing
  • craft forged packets using free tools
  • recognize how impersonation can be used to gain unauthorized access
  • recognize CSS attacks
  • recognize root kits
  • explain the concept of privilege escalation
  • distinguish the difference between common exploit tools
  • use Metasploit tools to further understand the attacker toolset
  • use Kali Linux tools to further understand the attacker toolset
  • crack passwords
  • recognize the importance of continuous monitoring of various systems
  • distinguish the difference between common monitoring tools
  • monitor the Linux OS
  • monitor the Windows OS
  • configure Windows event log forwarding
  • identify where SIEM is used
  • identify where SCADA and ICS are used in different industries
  • view network utilization
  • analyze timestamped data from various sources
  • identify trends in network usage
  • identify events from specific types of logs
  • describe the difference between vulnerabilities and exploits as well as use various reporting tools
  • Course Number:
    cs_cybs_a06_it_enus