CompTIA Cybersecurity Analyst+: Monitoring Tools & Analytics

Cyber Security
  • 12 Videos | 1h 12m 53s
  • Includes Assessment
  • Earns a Badge
Likes 36 Likes 36
IT systems can be exploited from both external and internal sources. Discover how to monitor and analyze various types of systems for auditing and security purposes.

WHAT YOU WILL LEARN

  • recognize the importance of continuous monitoring of various systems
    distinguish the difference between common monitoring tools
    monitor the Linux OS
    monitor the Windows OS
    configure Windows event log forwarding
    identify where SIEM is used
  • identify where SCADA and ICS are used in different industries
    view network utilization
    analyze timestamped data from various sources
    identify trends in network usage
    identify events from specific types of logs
    describe the difference between vulnerabilities and exploits as well as use various reporting tools

IN THIS COURSE

  • Playable
    1. 
    Reasons for Monitoring
    4m 4s
    UP NEXT
  • Playable
    2. 
    Common Monitoring Tools
    6m 40s
  • Locked
    3. 
    Linux OS Monitoring Tools
    9m 12s
  • Locked
    4. 
    Windows OS Monitoring Tools
    7m 22s
  • Locked
    5. 
    Windows Event Log Forwarding
    5m 38s
  • Locked
    6. 
    SIEM
    5m 30s
  • Locked
    7. 
    SCADA and ICS
    2m 2s
  • Locked
    8. 
    Monitoring Network Bandwidth
    5m 1s
  • Locked
    9. 
    Point-in-time Data Analysis
    5m 10s
  • Locked
    10. 
    Data Correlation and Analytics
    5m 54s
  • Locked
    11. 
    Detailed Log Analysis
    6m 21s
  • Locked
    12. 
    Exercise: Understand Exploits and Monitoring
    4m 31s

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion of this course, which can be shared on any social network or business platform

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE

PEOPLE WHO VIEWED THIS ALSO VIEWED THESE