CompTIA Cybersecurity Analyst+: Monitoring Tools & Analytics

Cyber Security    |    Intermediate
  • 12 videos | 1h 7m 23s
  • Includes Assessment
  • Earns a Badge
Rating 4.7 of 175 users Rating 4.7 of 175 users (175)
IT systems can be exploited from both external and internal sources. Discover how to monitor and analyze various types of systems for auditing and security purposes.

WHAT YOU WILL LEARN

  • Recognize the importance of continuous monitoring of various systems
    Distinguish the difference between common monitoring tools
    Monitor the linux os
    Monitor the windows os
    Configure windows event log forwarding
    Identify where siem is used
  • Identify where scada and ics are used in different industries
    View network utilization
    Analyze timestamped data from various sources
    Identify trends in network usage
    Identify events from specific types of logs
    Describe the difference between vulnerabilities and exploits as well as use various reporting tools

IN THIS COURSE

  • 4m 4s
    After completing this video, you will be able to recognize the importance of continuous monitoring of various systems. FREE ACCESS
  • 6m 40s
    During this video, you will learn how to distinguish the difference between common monitoring tools. FREE ACCESS
  • Locked
    3.  Linux OS Monitoring Tools
    9m 12s
    In this video, you will learn how to monitor the Linux operating system. FREE ACCESS
  • Locked
    4.  Windows OS Monitoring Tools
    7m 22s
    In this video, you will learn how to monitor the Windows OS. FREE ACCESS
  • Locked
    5.  Windows Event Log Forwarding
    5m 38s
    In this video, you will configure Windows Event Log Forwarding. FREE ACCESS
  • Locked
    6.  SIEM
    5m 30s
    In this video, you will identify where SIEM is used. FREE ACCESS
  • Locked
    7.  SCADA and ICS
    2m 2s
    In this video, you will identify where SCADA and ICS are used in different industries. FREE ACCESS
  • Locked
    8.  Monitoring Network Bandwidth
    5m 1s
    In this video, you will learn how to view network utilization. FREE ACCESS
  • Locked
    9.  Point-in-time Data Analysis
    5m 10s
    In this video, you will learn how to analyze timestamped data from various sources. FREE ACCESS
  • Locked
    10.  Data Correlation and Analytics
    5m 54s
    In this video, you will identify trends in network usage. FREE ACCESS
  • Locked
    11.  Detailed Log Analysis
    6m 21s
    Learn how to identify events from specific types of logs. FREE ACCESS
  • Locked
    12.  Exercise: Understand Exploits and Monitoring
    4m 31s
    Upon completion of this video, you will be able to describe the difference between vulnerabilities and exploits as well as use various reporting tools. FREE ACCESS

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE

Rating 5.0 of 2 users Rating 5.0 of 2 users (2)
Rating 4.8 of 52 users Rating 4.8 of 52 users (52)
Rating 5.0 of 4 users Rating 5.0 of 4 users (4)

PEOPLE WHO VIEWED THIS ALSO VIEWED THESE

Rating 4.8 of 75 users Rating 4.8 of 75 users (75)
Rating 4.5 of 275 users Rating 4.5 of 275 users (275)
Rating 4.5 of 434 users Rating 4.5 of 434 users (434)