Description
Course info
Level
Intermediate
Updated
Nov 10, 2020
Duration
2h 5m
Description

How do you create a security profile for your company to stay ahead of attackers? In this course, Security Operations and Monitoring for CompTIA CySA+, you’ll learn to configure your resources to better protect them as well as what Indicators of Compromise (IoC) you should be monitoring. First, you’ll explore the basics of security monitoring. Next, you’ll discover how to setup and monitor the different types of nodes/system on your network. Finally, you’ll learn how to configure various security technologies to help harden your system, devices, and applications from attackers. When you’re finished with this course, you’ll have the skills and knowledge of a security analysist needed to configure your resources to better protect them as well as what Indicators of Compromise (IoC) you should be monitoring.

About the author
About the author

Dale Meredith has been a Certified Ethical Hacker/Instructor EC-Council for the past 15 years, and Microsoft Certified Trainer for over 20 years. Dale also has an additional 7 years of senior IT management experience and worked as a CTO for a popular ISP provider. Dale's expertise is in explaining difficult concepts and ensuring his students have an actionable knowledge of the course material.

More from the author
More courses by Dale Meredith
Section Introduction Transcripts
Section Introduction Transcripts

Course Overview
Hey, welcome, everyone. My name is Dale Meredith, and I'm really excited to welcome you to my course, Security Operations and Monitoring for CompTIA CySA+. Now, you may be asking yourself, "Who is this guy, Dale?" Well, I've been a Microsoft trainer since 1998 and a certified ethical hacker since the early 2000's. As well as a certified EC‑Council trainer. I've taught audiences from around the world from universities to Inc. 500 companies, and even several U.S. government agencies, which I'd love to tell you about. But yeah, you know, I can't. Now, this course is the seventh course in your journey towards the CySA certification. In this course, Security Operations and Monitoring for CompTIA CySA+, you'll learn to configure your resources to better protect them, as well as what IOC's, we call those indicator of compromises, that we should be monitoring. First, you'll explore the basics of security monitoring. Next, you'll discover how to set up and monitor the different types of nodes or systems on your network. And finally, you'll learn how to configure various security technologies to help you harden your infrastructure, your devices, and your apps. When you're finished with this course, you'll have the skills and knowledge of a security analyst needed to configure your resources to better protect them, as well as what IOC's you should be monitoring. From here, you can continue your learning by diving into other security related courses here at Pluralsight, including the Ethical Hacking course or the PenTest+. There are other courses here that are specialized security content that are done by some of the industry's best known cybersecurity folks. I hope you'll join me in learning and understanding the concepts of Security Operations and Monitoring for CompTIA CySA+, here at Pluralsight.