SecOps Engineer: Threat Mitigation
IT Security
| Intermediate
- 13 Videos | 56m 59s
- Includes Assessment
- Earns a Badge
This course explores the general concepts of threat mitigation for SecOps (security and operations) engineers. In this 13 videos, learners will observe the three basic concepts for threat mitigation and threat intelligence: identification, prevention, and responses. This course examines acceptable risk levels. You will analyze malware classification, such as viruses, worms, logic bombs, and backdoor software. You will learn to mitigation malware, and threats to websites; and examine types of ransomware, including Cryptolocker, Cryptowall, WannaCry, and Bad Rabbit, as well as explore possible solutions. You will learn how DoS (denial of service) is conducted, and see examples of specific attacks; then examine cross-Site Scripting, parameter traversal, and cross-Site Request Forgery. You will learn to address insider threats, and how to mitigate social engineering, phishing, and insecure protocols. Learners will examine how to integrate analysis into mitigating these threats. Finally, this course explores cyberthreat intelligence, and suggests that you subscribe to the National Vulnerability Database, and its feeds.
WHAT YOU WILL LEARN
-
discover the key concepts covered in this coursedescribe and integrate threat mitigation concepts into security operationsanalyze and mitigate malware threatsdescribe approaches to ransomware mitigationdescribe threats to websitesrespond effectively to DoS attacksanalyze the danger of insider threats and take mitigating steps
-
integrate mitigation for social engineering into security operationsdescribe the threats posed by phishing and integrate mitigation steps into security operationsdescribe the threat of using insecure protocols and how to mitigate that threatuse cyberthreat intelligence and integrate it into mitigation strategiesuse cyberthreat intelligence resources effectivelysummarize the key concepts covered in this course
IN THIS COURSE
-
1.Course Overview1m 26sUP NEXT
-
2.Threat Mitigation Concepts4m 11s
-
3.General Malware Threats5m 56s
-
4.Ransomware Threats5m 55s
-
5.Website Threats6m 1s
-
6.Denial of Service Threats6m 53s
-
7.Insider Threats5m 6s
-
8.Social Engineering4m 44s
-
9.Phishing Threats3m 18s
-
10.Insecure Protocols3m 45s
-
11.Cyberthreat Intelligence3m 2s
-
12.Using Cyberthreat Intelligence Resources5m 51s
-
13.Course summary52s
EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE
Skillsoft is providing you the opportunity to earn a digital badge upon successful completion of this course, which can be shared on any social network or business platform
Digital badges are yours to keep, forever.