Security Operations for CompTIA Security+
This course will teach you the essential foundations of sound security operations concepts along with the reasons why they’re important, both for real-world implementation and the Security+ exam.
What you'll learn
A successful career in cyber security is built upon a strong foundation in security operations, and the platforms and elements that go into designing a secure environment. In this course, Security Operations for CompTIA Security+ , you'll learn the key elements to managing a secure environment. First, you’ll discover how to manage critical elements like setting baselines, managing hardware and software assets, monitoring and alerting, vulnerability assessments, and proper incident response. Finally, you’ll explore the concepts required to properly leverage data to support investigations. When you’re finished with this course, you’ll have the concepts and knowledge necessary for the Security+ exam.
Table of contents
- Secure Baselines 5m
- Hardening Targets 2m
- Wireless Considerations (Site Surveys, Heat Maps, and WiFi Analyzers) 3m
- Wireless Band Selection and Width 1m
- Mobile Device Management 2m
- BYOD Concerns 2m
- Cellular Device Security 3m
- WiFi Security 2m
- WPA3 vs. WPA2 2m
- RADIUS 3m
- Static Code Analysis and Sandboxing 3m
- Module Intro and Important Key Takeaways 2m
- Vulnerability Scanning 2m
- Demo: Vulnerability Scanning 3m
- Static and Dynamic Code Analysis 2m
- Package Monitoring 1m
- Open Source Intelligence (OSINT) 3m
- Surface, Deep and Dark Web, and the Onion Routing Network 4m
- Penetration Testing 2m
- Lateral Movement 5m
- Bug Bounty 1m
- False Positives and False Negatives 2m
- CVE and CVSS 5m
- Validation and Reporting Considerations 2m
- Module Intro and Important Takeaways 2m
- Monitoring Computing Resources 1m
- Gathering and Correlating Information 2m
- Archiving Data 1m
- Alert Response, Remediation, and Alert Tuning 4m
- SCAP Components 2m
- SIEM, Event Correlation, and Log Management 3m
- Data Loss Prevention 1m
- SNMP Traps 2m
- NetFlow/sFlow/IPFIX 7m
- Module Intro and Key Takeaways 2m
- Firewalls and Security Zones 2m
- Demo: Securing Outbound Traffic with Azure Firewall 4m
- IDS/IPS 1m
- Web Filters and Centralized Proxies 3m
- Operating System Security, GPOs, and SELinux 2m
- Implementation of Secure Protocols 5m
- DNS Resolution and DNS Filtering 5m
- DMARC, SPIF, and DKIM 3m
- File Integrity Monitoring 1m
- Network Access Control (NAC) 1m
- Endpoint Detection and Response (EDR) and Extended Detection and Response (XDR) 2m
- Module Intro and Key Takeaways 3m
- Provisioning and Deprovisioning Accounts 2m
- Identity Proofing 1m
- Active Directory 1m
- IdP Example 2m
- SAML 1m
- OAuth and OpenID 2m
- Attestation 2m
- Access Controls (MAC, DAC, RBAC, and ABAC) 3m
- Least Privilege 1m
- Biometric Factors and Multifactor Authentication 2m
- Password Best Practices and Password Managers 2m
- Privileged Access Management Tools 2m
- Module Intro, Key Takeaways, and Phases of Incident Response 2m
- Preparation, Detection, Analysis, Containment, and Eradication 5m
- Training and Exercise Types 7m
- Root Cause Analysis (RCA) 2m
- Threat Hunting 3m
- Intelligence and Threat Intelligence Lifecycles 3m
- Cyber Kill Chain 2m
- Digital Forensics, Legal Hold, Chain of Custody, and Image Acquisition 10m