Companies Home Search Profile

Operations and Incident Response for CompTIA Security+

Focused View

Christopher Rees

3:55:10

87 View
  • 1. Course Overview.mp4
    01:56
  • 01. Module Overview.mp4
    00:51
  • 02. Traceroutetracert.mp4
    01:52
  • 03. nslookupdig.mp4
    01:31
  • 04. ipconfigifconfig.mp4
    00:55
  • 05. nmap and nmap demo.mp4
    03:08
  • 06. Ping and Pathping.mp4
    02:31
  • 07. hping and hping demo.mp4
    02:36
  • 08. Netstat.mp4
    01:17
  • 09. netcat.mp4
    01:58
  • 10. IP Scanners.mp4
    00:52
  • 11. ARP.mp4
    00:46
  • 12. Route.mp4
    00:32
  • 13. Curl and Curl Demo.mp4
    01:36
  • 14. TheHarvester and Demo.mp4
    01:44
  • 15. Sn1per and Demo.mp4
    03:57
  • 16. Scanless and Demo.mp4
    01:44
  • 17. DNSenum.mp4
    00:38
  • 18. Nessus and Cuckoo.mp4
    02:31
  • 19. File Manipulation (Head, Tail, Cat, GREP and Logger).mp4
    02:32
  • 20. CHMOD.mp4
    01:05
  • 21. Shell and Script Environments (SSH, PowerShell, Python and O.mp4
    01:23
  • 22. Packet Capture and TCPDump Demo.mp4
    02:31
  • 23. Forensics.mp4
    05:06
  • 24. Exploitation Frameworks.mp4
    02:03
  • 25. Data Sanitization Tools.mp4
    04:59
  • 26. Module Review.mp4
    00:35
  • 01. Module Intro.mp4
    00:50
  • 02. Who Should Watch this Course.mp4
    02:49
  • 03. Team Models.mp4
    01:14
  • 04. Incident Response Process.mp4
    01:44
  • 05. Preparation.mp4
    01:31
  • 06. Detection and Analysis.mp4
    03:05
  • 07. Stopping the Spread.mp4
    02:37
  • 08. Defining Goals and Expected Outcomes.mp4
    03:46
  • 09. Test the Plan.mp4
    00:54
  • 10. Walkthrough Tests.mp4
    01:55
  • 11. Communication Tests.mp4
    01:07
  • 12. Simulation (Tabletop) Tests.mp4
    00:58
  • 13. Partial Exercise.mp4
    00:55
  • 14. Full Exercise.mp4
    00:42
  • 15. Overall Cost and Complexity of Testing.mp4
    00:58
  • 16. Plan Review and Maintenance.mp4
    01:46
  • 17. Review Process Outcomes.mp4
    00:50
  • 18. Wired Brain Coffees Testing.mp4
    01:54
  • 19. Intelligence Lifecycle.mp4
    00:28
  • 20. Threat Intelligence Lifecycle.mp4
    01:24
  • 21. Cyberthreat Intelligence Frameworks.mp4
    01:02
  • 22. Cyber Kill Chain.mp4
    01:51
  • 23. Diamond Model.mp4
    01:54
  • 24. MITRE Attack Framework.mp4
    02:26
  • 25. Key Points to Remember.mp4
    02:00
  • 26. Types of Plans.mp4
    00:43
  • 27. Disaster Recovery Plan.mp4
    00:57
  • 28. Business Continuity Plan.mp4
    00:51
  • 29. Business Resumption Plan.mp4
    00:51
  • 30. Incident Management Plan.mp4
    01:12
  • 31. Data Retention.mp4
    02:45
  • 32. Putting It All Together.mp4
    02:26
  • 33. Example Process.mp4
    04:25
  • 01. Module Intro.mp4
    01:13
  • 02. Filtering Through the Noise.mp4
    03:31
  • 03. Vulnerability Scanner Demo.mp4
    03:36
  • 04. SIEM.mp4
    03:12
  • 05. Log Files.mp4
    04:02
  • 06. Log Management, Syslog, Rsyslog, and Syslog-ng.mp4
    03:20
  • 07. Journalctl.mp4
    03:23
  • 08. NXLOG.mp4
    00:42
  • 09. Retention (Auditing, Compliance and Investigations).mp4
    02:01
  • 10. Bandwidth Monitors.mp4
    01:21
  • 11. Metadata.mp4
    03:18
  • 12. Netflow, sFlow, and IPFIX.mp4
    04:54
  • 13. Detecting an Amplification Attack (ICMP echo).mp4
    02:17
  • 14. Protocol Analyzer Output.mp4
    05:31
  • 01. Module Intro.mp4
    00:49
  • 02. Application WhitelistingBlacklisting.mp4
    01:16
  • 03. Quarantine.mp4
    02:23
  • 04. Firewalls.mp4
    06:03
  • 05. Demo - Configuring Firewall Rules.mp4
    03:53
  • 06. Mobile Device Management.mp4
    04:40
  • 07. Using MDM to Locate and Secure and Lost Device.mp4
    01:05
  • 08. DLP, Content FiltersURL Filters and UpdatingRevoking Certificates.mp4
    03:07
  • 09. Segregation, Segmentation and Isolation.mp4
    02:51
  • 10. Virtualization.mp4
    01:10
  • 11. Air Gaps.mp4
    01:55
  • 12. Securing the Environment using Isolation, Containment and Segment.mp4
    01:55
  • 13. SOAR and RunbooksPlaybooks.mp4
    05:27
  • 01. Module Overview.mp4
    01:13
  • 02. Computer Forensics.mp4
    02:29
  • 03. Order of Volatility.mp4
    05:05
  • 04. Chain of Custody.mp4
    02:35
  • 05. Legal Hold.mp4
    01:20
  • 06. First Responder Best Practices.mp4
    04:57
  • 07. Capture a System Image.mp4
    03:33
  • 08. Network Traffic and Logs.mp4
    03:55
  • 09. Capturing Video.mp4
    00:57
  • 10. Record Time Offset.mp4
    02:28
  • 11. Taking Hashes.mp4
    01:56
  • 12. Screenshots.mp4
    01:02
  • 13. Witnesses.mp4
    01:56
  • 14. Preservation of Evidence.mp4
    01:31
  • 15. Recovery.mp4
    01:25
  • 16. Strategic Intelligence Counterintelligence Gathering.mp4
    01:27
  • 17. Data Integrity.mp4
    01:59
  • 18. Non-repudiation.mp4
    00:53
  • 19. On-prem vs. Cloud Challenges and Right to Audit.mp4
    03:26
  • 20. Regulatory Jurisdictional Issues.mp4
    01:55
  • 21. Data Breach Notification Laws.mp4
    02:14
  • Description


    Experiencing a cyber event is not a question of if, but of when. This course will teach you the skills necessary to assess organizational security and respond to various cyber-related incidents.

    What You'll Learn?


      Proper and timely incident response including gathering data and preservation of evidence is critical to a successful response and investigation. In this course, Operations and Incident Response for CompTIA Security+, you’ll learn to how to assess your organizational security and respond to cyber-related incidents. First, you’ll explore the tools and techniques associated with network reconnaissance and discovery. Next, you’ll learn the steps in the incident response process along with the various attack frameworks and testing methodologies. From there, you’ll learn the components of a proper communication plan, business continuity and disaster recovery plan to help prepare for, and respond to, a cyber event. Finally, you’ll learn key aspects of digital forensics. When you’re finished with this course, you’ll have the skills and knowledge necessary to not only plan and prepare for cyber events, but to respond and investigate when they do.

    More details


    User Reviews
    Rating
    0
    0
    0
    0
    0
    average 0
    Total votes0
    Focused display
    Christopher Rees
    Christopher Rees
    Instructor's Courses
    Chris is a professional information technologist, trainer, manager and lifelong learner. He is married with 3 beautiful children and interested in martial arts, working out, spending time with family and friends and being creative whenever possible. He has created a number of IT Certification training courses over the past 10 years and really enjoys helping people advance their careers through training and personal development.
    Pluralsight, LLC is an American privately held online education company that offers a variety of video training courses for software developers, IT administrators, and creative professionals through its website. Founded in 2004 by Aaron Skonnard, Keith Brown, Fritz Onion, and Bill Williams, the company has its headquarters in Farmington, Utah. As of July 2018, it uses more than 1,400 subject-matter experts as authors, and offers more than 7,000 courses in its catalog. Since first moving its courses online in 2007, the company has expanded, developing a full enterprise platform, and adding skills assessment modules.
    • language english
    • Training sessions 108
    • duration 3:55:10
    • level preliminary
    • English subtitles has
    • Release Date 2023/02/07