CBROPS: Host-based Analysis & the Role of Attribution
Cisco CBROPS | Intermediate
- 4 Videos | 1h 9m 52s
- Includes Assessment
- Earns a Badge
In this course, you'll learn about host-based attacks in their various forms. Next, you'll explore components of Windows 10 and Ubuntu that are useful in host-based analysis. Finally, you'll examine the concept of attribution and its importance when investigating an organizational security breach. This course is one of a collection that prepares learners for the 200-201: Understanding Cisco Cybersecurity Operations Fundamentals (CBROPS) exam.
WHAT YOU WILL LEARN
recognize the type of attack a hacker uses to encrypt your data and withhold the encryption keyrecognize the type of attack that involves a hacker sending more data to an application than what it can handleidentify the type of attack that involves the hacker using malicious software to call home and control your systemrecognize tools used to identify performance issues on a Windows systemidentify tools that can be used to identify reliability issues with the Windows systemidentify the command to view user account and group changes on a Linux system
recognize the folder in Linux that is the default folder for log filesrecognize tools in Linux to monitor the health of the systemidentify an example of an indicator of compromise (IOC)recognize the phases of the Cyber Kill Chainrecognize examples of digital assets when performing an investigation
EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE
Skillsoft is providing you the opportunity to earn a digital badge upon successful completion of this course, which can be shared on any social network or business platformDigital badges are yours to keep, forever.