CompTIA Cybersecurity Analyst+: Intrusion Detection & Traffic Analysis

Cybersecurity Analyst+    |    Intermediate
  • 20 videos | 1h 27m
  • Includes Assessment
  • Earns a Badge
Rating 4.6 of 55 users Rating 4.6 of 55 users (55)
Discover how IT security analysts must recognized how malicious attacks take place. Explore how to analyze log results allows for the detection of security incidents. This course can be used in preparation for the CompTIA Cybersecurity Analyst (CySA+) Certification Exam CS0-002.

WHAT YOU WILL LEARN

  • Discover the key concepts covered in this course
    Identify suspicious log entries
    View a sample burp suite report
    Scan a web app using nikto
    Deploy kali linux as a cloud-based virtual machine
    Install and configure the snort ids tool (mention sinkhole, antivirus heuristics)
    Create a snort ids rule
    Analyze an ics traffic capture
    Capture and analyze http user authentication traffic
    Playback a captured voip call
  • Upload a pcap file for analysis
    Enter a wpa password in wireshark to decrypt wireless traffic
    Use hashing to detect file changes through steganography
    Monitor, block, and configure notifications for devices on a wi-fi network using the eero app
    Use third-party tool to encrypt sensitive files
    Use aircrack-ng in kali linux to crack protected wi-fi networks
    Use kismet to detect wi-fi networks
    Use nessus to audit amazon web services (aws)
    Use nessus to scan lan hosts for malware
    Summarize the key concepts covered in this course

IN THIS COURSE

  • 2m 30s
  • 4m 36s
    In this video, learn how to identify suspicious log entries. FREE ACCESS
  • Locked
    3.  Burp Suite Reports
    5m 18s
    Learn how to view a sample report from Burp Suite. FREE ACCESS
  • Locked
    4.  Nikto Web App Scanning
    5m 10s
    Learn how to scan a web app using Nikto. FREE ACCESS
  • Locked
    5.  Kali Linux Cloud Deployment
    4m 43s
    Learn how to deploy Kali Linux as a cloud-based virtual machine. FREE ACCESS
  • Locked
    6.  Snort Installation
    3m 2s
    During this video, you will learn how to install and configure the Snort IDS tool, as well as how to sinkhole and use antivirus heuristics. FREE ACCESS
  • Locked
    7.  Snort Rules
    9m 47s
    During this video, you will learn how to create a Snort IDS rule. FREE ACCESS
  • Locked
    8.  Industrial Control System Network Traffic
    5m 25s
    During this video, you will learn how to analyze an ICS traffic capture. FREE ACCESS
  • Locked
    9.  HTTP Authentication Traffic
    2m 54s
    In this video, you will capture and analyze HTTP user authentication traffic. FREE ACCESS
  • Locked
    10.  VoIP Traffic Analysis
    2m 39s
    In this video, find out how to play back a captured VoIP call. FREE ACCESS
  • Locked
    11.  Online Network Traffic Analysis
    3m 24s
    Learn how to upload a PCAP file for analysis. FREE ACCESS
  • Locked
    12.  IEEE 802.11 WPA Traffic
    3m 22s
    In this video, find out how to enter a WPA password in WireShark to decrypt wireless traffic. FREE ACCESS
  • Locked
    13.  Steganography and Hashing
    4m 9s
    Find out how to use hashing to detect file changes through steganography. FREE ACCESS
  • Locked
    14.  Wi-Fi Connected Devices
    2m 59s
    In this video, learn how to monitor, block, and configure notifications for devices on a Wi-Fi network using the eero app. FREE ACCESS
  • Locked
    15.  Third-party File Encryption
    2m 56s
    Find out how to use a third-party tool to encrypt sensitive files. FREE ACCESS
  • Locked
    16.  Aircrack-ng
    8m 1s
    In this video, you will use aircrack-ng to crack protected Wi-Fi networks in Kali Linux. FREE ACCESS
  • Locked
    17.  Kismet
    3m 40s
    During this video, you will learn how to use Kismet to detect wireless networks. FREE ACCESS
  • Locked
    18.  Cloud Vulnerability Scanning
    5m 54s
    In this video, you will learn how to use Nessus to audit Amazon Web Services (AWS). FREE ACCESS
  • Locked
    19.  LAN Malware Scan
    5m 8s
    In this video, you will use Nessus to scan LAN hosts for malware. FREE ACCESS
  • Locked
    20.  Course Summary
    1m 23s

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE

Rating 5.0 of 1 users Rating 5.0 of 1 users (1)
Rating 4.6 of 123 users Rating 4.6 of 123 users (123)
Rating 5.0 of 2 users Rating 5.0 of 2 users (2)

PEOPLE WHO VIEWED THIS ALSO VIEWED THESE

Rating 4.7 of 62 users Rating 4.7 of 62 users (62)
Rating 4.2 of 164 users Rating 4.2 of 164 users (164)
Rating 4.6 of 41 users Rating 4.6 of 41 users (41)