CompTIA Cybersecurity Analyst+: Threat Intelligence
Cybersecurity Analyst+
| Intermediate
- 14 Videos | 48m 45s
- Includes Assessment
- Earns a Badge
Your organization's security posture is critical to its success-and security technicians must be aware of known and emerging security threats from a variety of sources. Learners begin this 14-video course by exploring various ways for security technicians to keep up-to-date and ahead of the curve. Examine various security intelligence sources and how to use the MITRE corporation's invaluable, trademarked ATT&CK knowledge base. Learners next discuss threat intelligence collection, threat classification for prioritization, and different sources and motivations of IT threats. Not sure what the bug bounty program is? Confused by false positives-mislabeled security alerts-and how to handle them? This course gives you the information you need. Become familiar with the Common Vulnerability Scoring System (CVSS), which provides a way to allocate or assign a score to a vulnerability: the higher the score, the bigger the threat. Then go on to examine the National Vulnerability Database (NVD). The course helps to prepare learners for CompTIA+ Cybersecurity Analyst+ (CySA+) CS0-002 certification exam.
WHAT YOU WILL LEARN
-
discover the key concepts covered in this courseidentify security intelligence sourcesuse the MITRE ATT&CK knowledge basecollect and analyze threat intelligence dataorganize threats by type to facilitate prioritizationrecognize different sources and motivations for IT threatsdiscuss the dark net
-
install and use the Tor browserdiscuss true positives and negatives as well as false positives and negativesmanage threat indicatorsidentify and prioritize risk mitigation techniquesexplore CVSS severity levelsidentify commonalities shared amongst bug bountiessummarize the key concepts covered in this course
IN THIS COURSE
-
1.Course Overview2m 4sUP NEXT
-
2.Sources of Intelligence4m 38s
-
3.MITRE ATT&CK5m 2s
-
4.Intelligence Collection3m 47s
-
5.Classifying Threats4m 32s
-
6.Threat Actor Types3m 27s
-
7.The Dark Net4m 37s
-
8.The Tor Web Browser2m 13s
-
9.Threat Positives and Negatives4m 13s
-
10.Threat Indications3m 3s
-
11.Threat Modeling3m 14s
-
12.Common Vulnerability Scoring System3m 47s
-
13.Bug Bounties2m 46s
-
14.Course Summary1m 21s
EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE
Skillsoft is providing you the opportunity to earn a digital badge upon successful completion of this course, which can be shared on any social network or business platform
Digital badges are yours to keep, forever.