وب سایت تخصصی شرکت فرین
دسته بندی دوره ها

CompTIA Cybersecurity Analyst+ (CySA+) (CS0-003): 1 Security Operations

سرفصل های دوره

As cybersecurity threats become more sophisticated and pervasive, the need for IT professionals with security analytics expertise has grown exponentially. Earning the CompTIA Cybersecurity Analyst (CySA+) certification shows potential employers that you understand how to tackle cybersecurity threats using a behavioral analytics-based approach. In this course—the first installment in the CompTIA Cybersecurity Analyst+ CySA+ (CS0-003) certification prep series, instructor Mike Chapple covers the topics covered in the Security Operations domain of the exam. Mike details topics concerning operating system security, logging, key infrastructure concepts, network security, identity and access management, and encryption.

LinkedIn Learning is a CompTIA Partner. As such, we are able to offer CompTIA exam vouchers at a 10% discount. For more information on how to obtain this discount, please download these PDF instructions.


01 - Introduction
  • 01 - Security operations
  • 02 - What you should know
  • 03 - Study resources
  • 04 - The goals of information security
  • 05 - Role of the cybersecurity analyst

  • 02 - 1. Operating System Security
  • 01 - Operating system security
  • 02 - Windows Registry
  • 03 - Configuration files
  • 04 - System processes
  • 05 - Hardware architecture

  • 03 - 2. Logging
  • 01 - Logging security information
  • 02 - Security information and event management
  • 03 - Tuning and configuring SIEMs
  • 04 - Continuous security monitoring

  • 04 - 3. Infrastructure Concepts
  • 01 - Virtualization
  • 02 - Cloud infrastructure components
  • 03 - Containers

  • 05 - 4. Network Security
  • 01 - Network architecture
  • 02 - Security zones
  • 03 - VLANs and network segmentation
  • 04 - Zero trust networking
  • 05 - Secure access service edge (SASE)
  • 06 - Software-defined networking (SDN)

  • 06 - 5. Identity and Access Management
  • 01 - Identification, authentication, authorization, and accounting
  • 02 - Usernames and access cards
  • 03 - Biometrics
  • 04 - Authentication factors
  • 05 - Multifactor authentication
  • 06 - Something you have
  • 07 - Password authentication protocols
  • 08 - Single sign-on and federation
  • 09 - Passwordless authentication
  • 10 - Privileged access management
  • 11 - Cloud access security brokers

  • 07 - 6. Encryption
  • 01 - Understanding encryption
  • 02 - Symmetric and asymmetric cryptography
  • 03 - Goals of cryptography
  • 04 - Trust models
  • 05 - PKI and digital certificates
  • 06 - TLS and SSL

  • 08 - 7. Sensitive Data Protection
  • 01 - Data classification
  • 02 - Data loss prevention

  • 09 - 8. Indicators of Malicious Activity
  • 01 - Network symptoms
  • 02 - Rogue access points and evil twins
  • 03 - Endpoint symptoms
  • 04 - Application symptoms
  • 05 - Obfuscated links
  • 06 - Social engineering

  • 10 - 9. Tools and Techniques
  • 01 - Protocol analyzers
  • 02 - DNS and IP reputation
  • 03 - Endpoint monitoring
  • 04 - Malware prevention
  • 05 - Executable analysis
  • 06 - Cuckoo and Joe Sandbox
  • 07 - User account monitoring

  • 11 - 10. Email Analysis
  • 01 - Malicious email content
  • 02 - Digital signatures
  • 03 - DKIM, DMARC, and SPF
  • 04 - Analyzing email headers

  • 12 - 11. Programming and Scripting
  • 01 - Shell and script environments
  • 02 - APIs
  • 03 - Querying logs

  • 13 - 12. Understanding the Cybersecurity Threat
  • 01 - Threat actors
  • 02 - Zero-days and the APT
  • 03 - Supply chain vulnerabilities
  • 04 - Threat classification

  • 14 - 13. Threat Intelligence
  • 01 - Threat intelligence
  • 02 - Managing threat indicators
  • 03 - Intelligence sharing
  • 04 - Threat research
  • 05 - Identifying threats
  • 06 - Automating threat intelligence
  • 07 - Threat hunting
  • 08 - Deception technologies

  • 15 - 14. Efficiency and Process Improvement
  • 01 - Standardizing processes and streamlining operations
  • 02 - Technology and tool integration

  • 16 - Conclusion
  • 01 - Continuing your studies
  • 139,000 تومان
    بیش از یک محصول به صورت دانلودی میخواهید؟ محصول را به سبد خرید اضافه کنید.
    خرید دانلودی فوری

    در این روش نیاز به افزودن محصول به سبد خرید و تکمیل اطلاعات نیست و شما پس از وارد کردن ایمیل خود و طی کردن مراحل پرداخت لینک های دریافت محصولات را در ایمیل خود دریافت خواهید کرد.

    ایمیل شما:
    تولید کننده:
    مدرس:
    شناسه: 16274
    حجم: 539 مگابایت
    مدت زمان: 265 دقیقه
    تاریخ انتشار: 25 تیر 1402
    دسته بندی محصول
    طراحی سایت و خدمات سئو

    139,000 تومان
    افزودن به سبد خرید