CompTIA Cybersecurity Analyst+: Threat Intelligence

Cybersecurity    |    Intermediate
  • 12 videos | 1h 9m 5s
  • Includes Assessment
  • Earns a Badge
Rating 5.0 of 4 users Rating 5.0 of 4 users (4)
Cybersecurity analysts and security tools can reference a variety of threat intelligence sources to keep up to date with the latest threats and mitigations. These can be used to help keep organization security policies as effective as possible. In this course, examine different threat intelligence sources, the common vulnerabilities and exposures (CVEs) website, and the MITRE ATT&CK knowledge base. Next, discover how the OWASP Top 10 can help harden vulnerable web applications, how advanced persistent threats (APTs) are executed, and common ISO/IEC standards. Finally, learn how to analyze CIS benchmark documents, the Common Vulnerability Scoring System (CVSS), common organization security policy structures, and how organizational culture relates to IT security. This course can be used to prepare for the CS0-003: CompTIA Cybersecurity Analyst+ (CySA+) exam.

WHAT YOU WILL LEARN

  • Discover the key concepts covered in this course
    Identify common threat intelligence sources
    View common cves and incorporate them into a security program
    Use the mitre att&ck knowledge base
    Recognize the importance of the owasp top 10 when hardening web applications
    Identify how apts are executed
  • Outline how iso/iec standards can result in proper it governance
    Download and analyze center for internet security (cis) benchmark documentation
    Use the common vulnerability scoring system (cvss) to describe it security threats
    List various types of security policies
    Outline how to ensure effective security governance through security awareness and business executive involvement
    Summarize the key concepts covered in this course

IN THIS COURSE

  • 1m 33s
    In this video, we will discover the key concepts covered in this course. FREE ACCESS
  • 6m 45s
    Upon completion of this video, you will be able to identify common threat intelligence sources. FREE ACCESS
  • Locked
    3.  Viewing Common Vulnerabilities and Exposures (CVEs)
    5m 57s
    In this video, find out how to view common CVEs and incorporate them into a security program. FREE ACCESS
  • Locked
    4.  Using MITRE ATT&CK
    7m 41s
    During this video, discover how to use the MITRE ATT&CK knowledge base. FREE ACCESS
  • Locked
    5.  OWASP Top 10
    10m 58s
    In this video, you will recognize the importance of the OWASP Top 10 when hardening web applications. FREE ACCESS
  • Locked
    6.  Advanced Persistent Threat (APT)
    6m 14s
    After completing this video, you will be able to identify how APTs are executed. FREE ACCESS
  • Locked
    7.  ISO/IEC Standards
    5m 17s
    Upon completion of this video, you will be able to outline how ISO/IEC standards can result in proper IT governance. FREE ACCESS
  • Locked
    8.  Downloading and Analyzing CIS Documentation
    5m 19s
    In this video, learn how to download and analyze Center for Internet Security (CIS) benchmark documentation. FREE ACCESS
  • Locked
    9.  Using the Common Vulnerability Scoring System (CVSS)
    5m 31s
    Discover how to use the Common Vulnerability Scoring System (CVSS) to describe IT security threats. FREE ACCESS
  • Locked
    10.  Organizational Security Policies
    6m 57s
    After completing this video, you will be able to list various types of security policies. FREE ACCESS
  • Locked
    11.  Organizational Culture and Security
    5m 54s
    Upon completion of this video, you will be able to outline how to ensure effective security governance through security awareness and business executive involvement. FREE ACCESS
  • Locked
    12.  Course Summary
    59s
    In this video, we will summarize the key concepts covered in this course. FREE ACCESS

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE

Rating 4.6 of 5 users Rating 4.6 of 5 users (5)
Rating 5.0 of 1 users Rating 5.0 of 1 users (1)
Rating 5.0 of 3 users Rating 5.0 of 3 users (3)

PEOPLE WHO VIEWED THIS ALSO VIEWED THESE

Rating 5.0 of 1 users Rating 5.0 of 1 users (1)
Rating 5.0 of 1 users Rating 5.0 of 1 users (1)
Rating 4.3 of 18 users Rating 4.3 of 18 users (18)