Author
Updated
11/20/2020Released
4/13/2020We are a CompTIA Partner. As such, we are able to offer CompTIA exam vouchers at a 10% discount. For more information on how to obtain this discount, please download these PDF instructions.
Skill Level Beginner
Duration
Views
- Security operations and monitoring teams carry out the important day-to-day work of cybersecurity. From monitoring security infrastructure to analyzing indicators of compromise, cybersecurity analysts spend a significant amount of their time with their sleeves rolled up doing this hands-on work. Performing this work requires a strong understanding of the role of cybersecurity operations within the organization and how elements of the organization's security infrastructure fit together. Businesses in all industries need skilled cybersecurity analysts who understand security operations and monitoring. CompTIA's Cybersecurity Analyst+ or CySA+ certification is a path that many technologists follow to advance their careers in this high-demand field. Hi, I'm Mike Chapple, and I'd like to invite you to watch my course on security operations and monitoring. It's part of an eight-course series preparing you for the CySA+ exam. I hope that you'll join me as we explore this important aspect of our field.
Related Courses
-
Implementing and Administering Azure Sentinel
with Pete Zerger59m 28s Intermediate -
DevSecOps: Automated Security Testing
with James Wickett1h 35m Intermediate -
DevSecOps: Continuous Application Security
with Tim Chase45m 40s Intermediate
-
Introduction
-
Study resources1m 41s
-
1. Security Monitoring
-
Monitoring Log Files6m 36s
-
Syslog3m 26s
-
Network traffic analysis3m 47s
-
-
2. Monitoring System Components
-
Endpoint monitoring3m 23s
-
Malware prevention5m 59s
-
Network monitoring4m 20s
-
Protocol analyzers6m 39s
-
DNS harvesting4m 30s
-
Web security tools3m 40s
-
Impact analysis3m 50s
-
Querying logs7m 10s
-
-
3. Email Analysis
-
Malicious email content2m 36s
-
Digital signatures4m 4s
-
DKIM, DMARC, and SPF5m 44s
-
Analyzing email headers2m 27s
-
-
4. Network Security Techniques
-
Restricting network access2m 13s
-
Network Access Control4m 29s
-
Firewall rule management4m 41s
-
Data loss prevention5m 34s
-
-
5. Endpoint Security
-
Operating system security7m 56s
-
Malware prevention1m 17s
-
Application management4m 9s
-
Host-based network security7m 37s
-
File permissions10m 20s
-
Executable analysis4m 15s
-
-
6. Security Automation
-
Workflow orchestration4m 44s
-
-
Conclusion
-
What's next41s
-
- Mark as unwatched
- Mark all as unwatched
Are you sure you want to mark all the videos in this course as unwatched?
This will not affect your course history, your reports, or your certificates of completion for this course.
CancelTake notes with your new membership!
Type in the entry box, then click Enter to save your note.
1:30Press on any video thumbnail to jump immediately to the timecode shown.
Notes are saved with you account but can also be exported as plain text, MS Word, PDF, Google Doc, or Evernote.
Share this video
Embed this video
Video: Security operations and monitoring