- Course
Compliance and Assessment for CompTIA CySA+
This course will teach you how to make sure your security profile provides coverage of data privacy and protection practices, risk management, and security frameworks.
- Course
Compliance and Assessment for CompTIA CySA+
This course will teach you how to make sure your security profile provides coverage of data privacy and protection practices, risk management, and security frameworks.
Get started today
Access this course and other top-rated tech content with one of our business plans.
Try this course for free
Access this course and other top-rated tech content with one of our individual plans.
This course is included in the libraries shown below:
- Security
What you'll learn
Many companies think they’ve covered their resources without making sure they’ve covered their bases. What checklist is there to help you make the right decisions? In this course, Compliance and Assessment for CompTIA CySA+, you’ll learn to how to assess your company’s security profile while making sure you’re in full compliance of any regulations that might apply to your industry.
First, you’ll explore how to utilize your threat intel to support your organization’s security which helps to better protect your resources.
Next, you’ll discover how to apply different security solutions to help you protect and monitor your internal infrastructure.
Finally, you’ll learn how to use industry standard security frameworks, polices, procedures, and control to protect your organization, customers, and employees.
When you’re finished with this course, you’ll have the skills and knowledge of cybersecurity analyst needed to assess and then tackle your organization required compliance.
Compliance and Assessment for CompTIA CySA+
-
Important Info About This Course | 53s
-
Roles and Responsibilities | 2m 38s
-
Security Operation Centers (SOC) | 46s
-
Security Control Categories | 5m 47s
-
Sourcing Your Intelligence | 3m 11s
-
Risk Management and Security Engineering | 1m 15s
-
Vulnerability Management and Frameworks | 6m 53s
-
Detection and Monitoring | 1m 35s
-
Threat Research | 2m 50s
-
Behavioral Threat Research | 3m 13s
-
Ongoing Scanning and Continuous Monitoring | 1m 26s
-
Procedures | 5m 35s
-
Quality Controls and Verification | 6m 6s