Security operations Course
2 hours, 10 minutes
Syllabus
Logging
Video - 00:14:00
Khet will discuss logging and how this applies to system and network architecture.
Operating system concepts
Video - 00:20:00
As an analyst, you will be required to understand basic operating functions along with how they interact with different security systems in your network. Understanding the characteristics of these operating system concepts will help you further your CySA knowledge.
Infrastructure concepts
Video - 00:11:00
In this episode, we will learn all about infrafrsucture concepts and discuss how they impact your environment.
Network architecture, part 1
Video - 00:12:00
Network components can be all over the place, both physically and logically. You have to understand how your network nodes are physically connected and logically organized to secure them from attack.
Network architecture, part 2
Video - 00:08:00
Network components can be all over the place, both physically and logically. You have to understand how your network nodes are physically connected and logically organized to secure them from attack.
Identity and access management (IAM)
Video - 00:13:00
You can’t restrict resource access to authorized users unless you can identify valid users. Identity management lets you know who is valid and who is not.
Encryption
Video - 00:08:00
Defensive security isn’t enough to stay safe. You must actively protect sensitive data from attacks instead of just reacting to attacks.
Standardized processes
Video - 00:14:00
With all of the rapidly changing security data available, the task of making sense of it becomes more and more difficult. Standards and protocols help to build automation tools to carry out many of the repetitive tasks efficiently.
Streamlined operations
Video - 00:10:00
In this episode, you will learn how to streamline operations with SOAR as well as other processes and tasks involving the human element.
Technology and tool integration
Video - 00:11:00
Technology and tools are constantly evolving in the realm of cyber security. This episode will give a high level overview of scripting, API's, webhooks, and plugins related to technology and tool integrations.
Threat actors
Video - 00:09:00
No human can manually monitor multiple systems and devices 24/7 to catch attacks from random sources. Automated monitors help to identify threat actors and Indicators of Compromise (IoC). These automated monitors not only make security easier, they also make it possible.
Unlock 7 days of free training
- 1,400+ hands-on courses and labs
- Certification practice exams
- Skill assessments
Plans & pricing
Infosec Skills Personal
$299 / year
- 190+ role-guided learning paths (e.g., Ethical Hacking, Threat Hunting)
- 100s of hands-on labs in cloud-hosted cyber ranges
- Custom certification practice exams (e.g., CISSP, Security+)
- Skill assessments
- Infosec peer community support
Infosec Skills Teams
$799 per license / year
- Team administration and reporting
- Dedicated client success manager
-
Single sign-on (SSO)
Easily authenticate and manage your learners by connecting to any identity provider that supports the SAML 2.0 standard.
-
Integrations via API
Retrieve training performance and engagement metrics and integrate learner data into your existing LMS or HRS.
- 190+ role-guided learning paths and assessments (e.g., Incident Response)
- 100s of hands-on labs in cloud-hosted cyber ranges
- Create and assign custom learning paths
- Custom certification practice exams (e.g., CISSP, CISA)
- Optional upgrade: Guarantee team certification with live boot camps