There is a tremendous skill shortage in the cybersecurity sector of IT that is hindering operations at organizations. In this course, Cisco CyberOps: Analyzing Hosts, you’ll learn the some of the concepts needed to start your journey into the SOC operations realm. First, you’ll explore the various endpoint technologies to secure a host. Next, you’ll discover about components of both Windows and Linux operating systems and how they can be compromised. We’ll also discuss investigation-related terminology and evidence with regards to investigations. Finally, you’ll learn about sandboxes and detonation chambers and the reports that they generate. When you’re finished with this course, you’ll be one step closer to having a solid understanding of cybersecurity concepts and be able to continue learning how to identify problems and perform tasks in a SOC environment.
Joe is a Network Consulting Engineer and has worked in the IT industry since 2010. He has experience in teaching and mentoring IT professionals in both DoD environments and in the civilian sector, in both the networking and IT security fields.
Course Overview Hi everyone. My name is Joe Abraham, and welcome to my course, Cisco CyberOps: Analyzing Hosts. I'm currently a cybersecurity consultant and a Pluralsight author with courses in the IT operations and cybersecurity domains. Are you new to cybersecurity or learning more about the topic? Do you want to learn more about cybersecurity concepts and operations with regards to our hosts? Well, in this course, we'll work on getting you that knowledge. I'll help you learn all about cybersecurity and many of the concepts that you should know. Some of the major topics that we will cover include learning about host‑based security tools, exploring investigations and related activities, and using malware analysis tools. By the end of this course, you'll know more about cyber operations and be able to understand attacks and the technology securing our hosts. Before beginning the course, you should be familiar with basic IT terminology and have a desire to learn more about cybersecurity. From here, you should feel comfortable diving further into the Cisco CyberOps path and other cybersecurity courses at Pluralsight to help solidify your knowledge and push you to increase your skills. I hope you'll join me on this journey to learn more about cyber operations with the Cisco CyberOps: Analyzing Hosts course, here at Pluralsight.