CompTIA Cybersecurity Analyst+: Monitoring Tools & Analytics
Cyber Security
| Intermediate
- 12 videos | 1h 7m 23s
- Includes Assessment
- Earns a Badge
IT systems can be exploited from both external and internal sources. Discover how to monitor and analyze various types of systems for auditing and security purposes.
WHAT YOU WILL LEARN
-
recognize the importance of continuous monitoring of various systemsdistinguish the difference between common monitoring toolsmonitor the Linux OSmonitor the Windows OSconfigure Windows event log forwardingidentify where SIEM is used
-
identify where SCADA and ICS are used in different industriesview network utilizationanalyze timestamped data from various sourcesidentify trends in network usageidentify events from specific types of logsdescribe the difference between vulnerabilities and exploits as well as use various reporting tools
IN THIS COURSE
-
1.Reasons for Monitoring4m 4sUP NEXT
-
2.Common Monitoring Tools6m 40s
-
3.Linux OS Monitoring Tools9m 12s
-
4.Windows OS Monitoring Tools7m 22s
-
5.Windows Event Log Forwarding5m 38s
-
6.SIEM5m 30s
-
7.SCADA and ICS2m 2s
-
8.Monitoring Network Bandwidth5m 1s
-
9.Point-in-time Data Analysis5m 10s
-
10.Data Correlation and Analytics5m 54s
-
11.Detailed Log Analysis6m 21s
-
12.Exercise: Understand Exploits and Monitoring4m 31s
EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE
Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.
Digital badges are yours to keep, forever.