CompTIA Cybersecurity Analyst+: Threat Mitigation

Cyber Security    |    Intermediate
  • 12 videos | 1h 3m 4s
  • Includes Assessment
  • Earns a Badge
Rating 4.5 of 56 users Rating 4.5 of 56 users (56)
Threat mitigation aims to eliminate or reduce risk of potential negative impact on IT systems. Explore the SDLC, penetration testing, and how to mitigate threats.

WHAT YOU WILL LEARN

  • Identify sdlc phases
    Apply secure coding practices
    Properly test technology solutions for security
    Reduce the attack surface of a network host
    Recognize the importance of keeping hardware and software up to date
    Apply patches properly to secure network hosts
  • Set the correct access to file systems while adhering to the principle of least privilege
    Recognize the purpose of controlling network access with nac
    Recognize the purpose of network segregation using vlans
    Identify various conditions that control access to resources
    Recognize the purpose of intentionally creating vulnerable hosts to monitor malicious use
    Recognize the purpose of a jump box

IN THIS COURSE

  • 5m 43s
    In this video, you will identify the SDLC phases. FREE ACCESS
  • 6m 15s
    Learn how to apply secure coding practices. FREE ACCESS
  • Locked
    3.  Security Testing
    5m 27s
    In this video, you will learn how to properly test technology solutions for security. FREE ACCESS
  • Locked
    4.  Host Hardening
    7m 27s
    In this video, find out how to reduce the attack surface of a network host. FREE ACCESS
  • Locked
    5.  Patching Overview
    5m 16s
    Upon completion of this video, you will be able to recognize the importance of keeping hardware and software up to date. FREE ACCESS
  • Locked
    6.  Use SCCM to Deploy Patches
    5m 18s
    In this video, learn how to apply patches properly to secure network hosts. FREE ACCESS
  • Locked
    7.  File System Permissions
    4m 8s
    During this video, you will learn how to set the correct access to file systems while following the principle of least privilege. FREE ACCESS
  • Locked
    8.  Network Access Control
    6m 25s
    After completing this video, you will be able to recognize the purpose of controlling network access with Network Access Control (NAC). FREE ACCESS
  • Locked
    9.  VLANs
    5m
    Upon completion of this video, you will be able to recognize the purpose of network segregation using virtual LANs. FREE ACCESS
  • Locked
    10.  Determining Resource Access
    5m 26s
    Find out how to identify various conditions that restrict access to resources. FREE ACCESS
  • Locked
    11.  Honeypots
    3m 6s
    After completing this video, you will be able to recognize the purpose of intentionally creating vulnerable hosts to monitor malicious use. FREE ACCESS
  • Locked
    12.  Jump Box
    3m 35s
    Upon completion of this video, you will be able to recognize the purpose of a jump box. FREE ACCESS

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE

Rating 4.6 of 123 users Rating 4.6 of 123 users (123)
Rating 5.0 of 2 users Rating 5.0 of 2 users (2)
Rating 5.0 of 3 users Rating 5.0 of 3 users (3)

PEOPLE WHO VIEWED THIS ALSO VIEWED THESE

Rating 4.7 of 6 users Rating 4.7 of 6 users (6)
Rating 4.2 of 6 users Rating 4.2 of 6 users (6)
Rating 4.6 of 1774 users Rating 4.6 of 1774 users (1774)