CompTIA Cybersecurity Analyst+: IT Security Risk Mitigation

Cybersecurity Analyst+    |    Intermediate
  • 16 videos | 1h 7m 9s
  • Includes Assessment
  • Earns a Badge
Rating 4.7 of 62 users Rating 4.7 of 62 users (62)
Discover how organizational security policies specify details for hardening organizational assets including patching, data masking and digital rights management. This course also covers baselines, secure disposal and IPsec. This course can be used in preparation for the CompTIA Cybersecurity Analyst (CySA+) Certification Exam CS0-002.

WHAT YOU WILL LEARN

  • Discover the key concepts covered in this course
    List challenges related to it security threat remediation
    Identify the importance of hardware and software patches
    Discuss the various categories of security controls
    Recognize the components of organizational security policies
    Enable data masking in microsoft azure
    Enable watermarks in amazon web services with elastic transcoder
    Recognize how baselines set a bar for normal expected activity
  • Discuss various types of it security training exercises
    Recall how automation can simplify and expedite security tasks
    Delete a disk partition using a multiple pass disk wiping tool
    Enable microsoft group policy password lockout settings
    Recognize how ipsec can be used to secure any type of ip traffic
    Enable ipsec connection security rules using microsoft group policy
    Capture and analyze ipsec network traffic
    Summarize the key concepts covered in this course

IN THIS COURSE

  • 2m 22s
  • 5m
    Upon completion of this video, you will be able to list challenges related to IT security threat remediation. FREE ACCESS
  • Locked
    3.  Firmware and Software Patching
    2m 12s
    Learn how to identify the importance of hardware and software patches. FREE ACCESS
  • Locked
    4.  Security Controls
    6m 57s
    In this video, find out how to discuss the various categories of security controls. FREE ACCESS
  • Locked
    5.  Organizational Security Policies
    2m 57s
    Upon completion of this video, you will be able to recognize the components of organizational security policies. FREE ACCESS
  • Locked
    6.  Cloud Data Masking
    2m 19s
    Learn how to enable data masking in Microsoft Azure. FREE ACCESS
  • Locked
    7.  Cloud Digital Rights Management
    4m 23s
    In this video, find out how to enable watermarks in Amazon Web Services with Elastic Transcoder. FREE ACCESS
  • Locked
    8.  Baselines
    6m 8s
    Upon completion of this video, you will be able to recognize how baselines set a bar for normal expected activity. FREE ACCESS
  • Locked
    9.  Security Training
    3m 34s
    In this video, you will discuss various types of IT security training exercises. FREE ACCESS
  • Locked
    10.  Security Automation
    7m 35s
    Upon completion of this video, you will be able to recall how automation can simplify and expedite security tasks. FREE ACCESS
  • Locked
    11.  Secure Disposal
    2m 11s
    In this video, learn how to delete a disk partition using a tool that wipes the disk multiple times. FREE ACCESS
  • Locked
    12.  Enable Password Lockout Settings
    5m 44s
    Learn how to enable password lockout settings in Microsoft Group Policy. FREE ACCESS
  • Locked
    13.  IPsec
    3m 9s
    Upon completion of this video, you will be able to recognize how IPsec can be used to secure any type of IP traffic. FREE ACCESS
  • Locked
    14.  Enable IPsec
    7m 6s
    In this video, learn how to enable IPsec connection security rules using Microsoft Group Policy. FREE ACCESS
  • Locked
    15.  IPsec Traffic Analysis
    4m 4s
    In this video, you will learn how to capture and analyze IPsec network traffic. FREE ACCESS
  • Locked
    16.  Course Summary
    1m 29s

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE

Rating 4.6 of 5 users Rating 4.6 of 5 users (5)
Rating 4.6 of 123 users Rating 4.6 of 123 users (123)
Rating 5.0 of 2 users Rating 5.0 of 2 users (2)

PEOPLE WHO VIEWED THIS ALSO VIEWED THESE

Rating 4.6 of 188 users Rating 4.6 of 188 users (188)
Rating 4.3 of 56 users Rating 4.3 of 56 users (56)
Rating 4.6 of 48 users Rating 4.6 of 48 users (48)