Save For Later

CompTIA CySA+ (CSO-001)

Save For Later

What You'll Learn

  • How to apply environmental reconnaissance techniques using the appropriate tools and processes
  • How to analyze the results of network reconnaissance
  • Given a network-based threat, how to implement or recommend the appropriate response and countermeasure
  • How to explain the purpose of practices used to secure a corporate environment
  • How to implement an information security vulnerability management process
  • How analyze the output resulting from a vulnerability scan
  • How to compare and contrast common vulnerabilities found within an organization
  • How to analyze threat data or behavior to determine the impact of an incident
  • How to prepare a toolkit and use appropriate forensics tools during an investigation
  • How to explain the importance of communication during the incident response process
  • How to analyze common symptoms to select the best course of action to support incident response
  • How to summarize the incident recovery and post-incident response process
  • How to explain the relationship between frameworks, common policies, controls, and procedures
  • How to use data to recommend remediation of security issues related to identity and access management
  • How to review security architecture and make recommendations to implement compensating controls
  • How to use application security best practices while participating in the software development life cycle
  • How to compare and contrast the general purpose and reasons for using various security tools and technologies
  • " >

    This series provides an overview of the knowledge and skills required to prevent, detect, and mitigate information/cyber security threats and vulnerabilities. This series can be used to prepare for the CompTIA CySA+ (Cybersecurity Analyst, CSO-001) first released in February 2017.For 10% discount when you sign up for your next CompTIA exam, use the code "PLURAL10"

    What You'll Learn

  • How to apply environmental reconnaissance techniques using the appropriate tools and processes
  • How to analyze the results of network reconnaissance
  • Given a network-based threat, how to implement or recommend the appropriate response and countermeasure
  • How to explain the purpose of practices used to secure a corporate environment
  • How to implement an information security vulnerability management process
  • How analyze the output resulting from a vulnerability scan
  • How to compare and contrast common vulnerabilities found within an organization
  • How to analyze threat data or behavior to determine the impact of an incident
  • How to prepare a toolkit and use appropriate forensics tools during an investigation
  • How to explain the importance of communication during the incident response process
  • How to analyze common symptoms to select the best course of action to support incident response
  • How to summarize the incident recovery and post-incident response process
  • How to explain the relationship between frameworks, common policies, controls, and procedures
  • How to use data to recommend remediation of security issues related to identity and access management
  • How to review security architecture and make recommendations to implement compensating controls
  • How to use application security best practices while participating in the software development life cycle
  • How to compare and contrast the general purpose and reasons for using various security tools and technologies
  • Read More

    OpenCourser is an affiliate partner of Pluralsight and may earn a commission when you buy through our links.

    From Pluralsight
    Hours 29
    Instructor Dale Meredith
    Language English
    Subjects IT & Networking

    Similar Courses

    Sorted by relevance

    Careers

    An overview of related careers and their average salaries in the US. Bars indicate income percentile (33rd - 99th).

    Media Planner (Direct Response) $35k

    Mobile Response Youth Program Counselor $37k

    Mobile Response/Crisis Intervention Clinician $42k

    Assessment Response Center (ARC) Specialist - Licensed Professionals $44k

    Corporate Security Advisor, Courier, Armorer, Emergency Response Team member $59k

    Business and Marketing Specialist - Peace Corps Response $61k

    Threat Detection & Incident Response... $65k

    Outbreak Response Scientists $72k

    Analyst-Customer Response Center $72k

    Operations Officer/Response Management $76k

    Munitions Response Project Geophysicist $104k

    Help Desk/Ticketing Response Operations Manager $112k

    Courses in this Paths

    Listed in the order in which they should be taken

    Starts Course Information

    On Demand

    Enterprise Security: Policies, Practices, and Procedures

    Most companies are "reactive" instead of "proactive" when it comes to securing their networks, resources, and data. In this course, Enterprise Security: Policies, Practices, and...

    Pluralsight

    Save

    On Demand

    The Issues of Identity and Access Management (IAM)

    IT networks face increasing threats from both inside and outside your organization. Traditional perimeter defenses can miss insider threats, such as password leaks and fraud due...

    Pluralsight

    Save

    On Demand

    Secure Software Development

    Most companies have a well-oiled machine with the sole purpose to create, release, and maintain functional software. Still, the growing concerns and risks related with insecure...

    Pluralsight

    Save

    On Demand

    Performing and Analyzing Network Reconnaissance

    You've been tasked as an "Incident Handler" and you are wondering where you start. Attackers typically start with doing a little "reconnaissance" of their target, so it only makes...

    Pluralsight

    Save

    On Demand

    Implementing and Performing Vulnerability Management

    Networks aren't what they us to be, they're more complex than ever. Systems today are so interconnected and buried within those systems are thousands of undetected security...

    Pluralsight

    Save

    On Demand

    Performing Incident Response and Handling (You were viewing this course)

    It’s not a matter of “if”, but rather “when” an attack is going to happen. No matter what you know or do, the hard truth is there's no guaranteed way to stop an attacker from...

    Pluralsight

    Save

    On Demand

    Preparing for and Executing Incident Recovery

    Cybersecurity investigations are used to determine what events, changes, and other actions have happened on a device, who or what performed them, and what data is stored there. In...

    Pluralsight

    Save

    Pluralsight

    From Pluralsight
    Hours 29
    Instructor Dale Meredith
    Language English
    Subjects IT & Networking

    Careers

    An overview of related careers and their average salaries in the US. Bars indicate income percentile (33rd - 99th).

    Media Planner (Direct Response) $35k

    Mobile Response Youth Program Counselor $37k

    Mobile Response/Crisis Intervention Clinician $42k

    Assessment Response Center (ARC) Specialist - Licensed Professionals $44k

    Corporate Security Advisor, Courier, Armorer, Emergency Response Team member $59k

    Business and Marketing Specialist - Peace Corps Response $61k

    Threat Detection & Incident Response... $65k

    Outbreak Response Scientists $72k

    Analyst-Customer Response Center $72k

    Operations Officer/Response Management $76k

    Munitions Response Project Geophysicist $104k

    Help Desk/Ticketing Response Operations Manager $112k

    Similar Courses

    Sorted by relevance