CRISC 2023: Threat Intelligence

CRISC    |    Intermediate
  • 11 videos | 55m 59s
  • Includes Assessment
  • Earns a Badge
Risk analysts and security tools can reference a variety of threat intelligence sources to keep up to date with the latest threats and mitigations. These can be used to help keep organization security policies as effective as possible. In this course, you will examine different threat intelligence sources such as the common vulnerabilities and exposures (CVEs) website. Then you will explore how the Open Web Application Security Project (OWASP) Top 10 can help harden vulnerable web applications. You will discover how artificial intelligence (AI) and machine learning (ML) are used in threat hunting. Next, you will investigate threat positives and negatives, as well as how advanced persistent threats (APTs) are executed. Finally, you will focus on the Cyber Kill Chain and learn how to detect threats using Amazon GuardDuty. This course can be used to prepare for the ISACA(r) Certified in Risk and Information Systems Control (CRISC(r)) certification.

WHAT YOU WILL LEARN

  • Discover the key concepts covered in this course
    Identify common threat intelligence sources
    View common cves and incorporate them into a security program
    Recognize the importance of the open web application security project (owasp) top 10 when hardening web applications
    Describe the importance of detecting anomalies and potential indicators of compromise
    Recognize the role that ai and ml play in threat hunting
  • Outline true positives and negatives as well as false positives and negatives
    Identify how apts are executed
    Establish a security model to detect, prevent, and lessen the impact of cybersecurity events
    Enable amazon guardduty threat detection and examine sample findings
    Summarize the key concepts covered in this course

IN THIS COURSE

  • 1m 6s
    In this video, we will discover the key concepts covered in this course. FREE ACCESS
  • 6m 40s
    Learn how to identify common threat intelligence sources. FREE ACCESS
  • Locked
    3.  Viewing Common Vulnerabilities and Exposures (CVEs)
    5m 35s
    In this video, you will view common CVEs and incorporate them into a security program. FREE ACCESS
  • Locked
    4.  OWASP Top 10
    8m 23s
    After completing this video, you will be able to recognize the importance of the Open Web Application Security Project (OWASP) Top 10 when hardening web applications. FREE ACCESS
  • Locked
    5.  Threat Hunting
    6m 45s
    Upon completion of this video, you will be able to describe the importance of detecting anomalies and potential indicators of compromise. FREE ACCESS
  • Locked
    6.  Artificial Intelligence (AI) and Machine Learning (ML) in Threat Hunting
    4m 25s
    After completing this video, you will be able to recognize the role that AI and ML play in threat hunting. FREE ACCESS
  • Locked
    7.  Threat Positives and Negatives
    4m 47s
    Upon completion of this video, you will be able to outline true positives and negatives as well as false positives and negatives. FREE ACCESS
  • Locked
    8.  Advanced Persistent Threat (APT)
    5m 50s
    After completing this video, you will be able to identify how APTs are executed. FREE ACCESS
  • Locked
    9.  The Cyber Kill Chain
    5m 28s
    Upon completion of this video, you will be able to establish a security model to detect, prevent, and lessen the impact of cybersecurity events. FREE ACCESS
  • Locked
    10.  Detecting Threats with Amazon GuardDuty
    5m 58s
    In this video, discover how to enable Amazon GuardDuty threat detection and examine sample findings. FREE ACCESS
  • Locked
    11.  Course Summary
    1m 2s
    In this video, we will summarize the key concepts covered in this course. FREE ACCESS

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE

Rating 5.0 of 1 users Rating 5.0 of 1 users (1)
Rating 4.6 of 30 users Rating 4.6 of 30 users (30)
Rating 5.0 of 2 users Rating 5.0 of 2 users (2)

PEOPLE WHO VIEWED THIS ALSO VIEWED THESE

Rating 5.0 of 1 users Rating 5.0 of 1 users (1)
Rating 4.8 of 5 users Rating 4.8 of 5 users (5)
Rating 4.5 of 441 users Rating 4.5 of 441 users (441)