CompTIA Cybersecurity Analyst+: Logging & Monitoring

Cybersecurity    |    Intermediate
  • 10 videos | 55m 1s
  • Includes Assessment
  • Earns a Badge
Rating 5.0 of 1 users Rating 5.0 of 1 users (1)
Logging and monitoring are crucial aspects of IT security governance. The ability to configure and centrally monitor logs to detect anomalies can prevent security incidents or minimize their impact. In this course, learn how to view Linux log files, configure log rotation for log retention, and configure Linux log forwarding to a central logging host. Next, work with Windows Event Viewer logs and configure Windows log forwarding. Finally, discover how tracking malicious actor activity is possible using honeypots and honeynets and how to implement a honeypot. This course can be used to prepare for the CS0-003: CompTIA Cybersecurity Analyst+ exam.

WHAT YOU WILL LEARN

  • Discover the key concepts covered in this course
    Identify common linux logs
    View common linux log files
    Configure log rotation
    Enable forwarding to a centralized logging host
  • View, filter, and set logging levels for event viewer logs
    Enable forwarding to a centralized logging host
    Recognize where honeypots and honeynets can be used to monitor malicious traffic
    Implement a honeypot
    Summarize the key concepts covered in this course

IN THIS COURSE

  • 1m 7s
    In this video, we will discover the key concepts covered in this course. FREE ACCESS
  • 9m 25s
    After completing this video, you will be able to identify common Linux logs. FREE ACCESS
  • Locked
    3.  Viewing Linux Logs
    6m 52s
    During this video, you will learn how to view common Linux log files. FREE ACCESS
  • Locked
    4.  Configuring Linux Log Rotation
    5m 42s
    In this video, discover how to configure log rotation. FREE ACCESS
  • Locked
    5.  Enabling Linux Log Forwarding
    7m 46s
    Find out how to enable forwarding to a centralized logging host. FREE ACCESS
  • Locked
    6.  Viewing and Configuring Windows Logs
    6m 25s
    In this video, you will learn how to view, filter, and set logging levels for Event Viewer logs. FREE ACCESS
  • Locked
    7.  Enabling Windows Log Forwarding
    5m 3s
    Discover how to enable forwarding to a centralized logging host. FREE ACCESS
  • Locked
    8.  Honeypots and Honeynets
    6m 49s
    Upon completion of this video, you will be able to recognize where honeypots and honeynets can be used to monitor malicious traffic. FREE ACCESS
  • Locked
    9.  Implementing a Honeypot
    5m 11s
    In this video, find out how to implement a honeypot. FREE ACCESS
  • Locked
    10.  Course Summary
    43s
    In this video, we will summarize the key concepts covered in this course. FREE ACCESS

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE

Rating 5.0 of 3 users Rating 5.0 of 3 users (3)
Rating 4.4 of 5 users Rating 4.4 of 5 users (5)
Rating 4.6 of 7 users Rating 4.6 of 7 users (7)

PEOPLE WHO VIEWED THIS ALSO VIEWED THESE

Rating 5.0 of 4 users Rating 5.0 of 4 users (4)
Rating 4.3 of 31 users Rating 4.3 of 31 users (31)
Rating 5.0 of 1 users Rating 5.0 of 1 users (1)