CompTIA Cybersecurity Analyst+ CS0-001: Threat Mitigation
Overview/Description
Target Audience
Prerequisites
Expected Duration
Lesson Objectives
Course Number
Expertise Level
Overview/Description
Applying security best practices to IT system creation and deployment can go a long way in reducing the attack surface. In this course, you will learn about the SDLC, penetration testing, how to mitigate threats, and the security frameworks on which these countermeasure are based.
Target Audience
IT specialists who will be responsible for securing and analyzing IT assets at the hardware and software levels
Prerequisites
None
Expected Duration (hours)
2.2
Lesson Objectives CompTIA Cybersecurity Analyst+ CS0-001: Threat Mitigation
start the course
identify SDLC phases
apply secure coding practices
properly test technology solutions for security
reduce the attack surface of a network host
recognize the importance of keeping hardware and software up to date
apply patches properly to secure network hosts
set the correct access to file systems while adhering to the principle of least privilege
recognize the purpose of controlling network access with NAC
recognize the purpose of network segregation using VLANs
identify various conditions that control access to resources
recognize the purpose of intentionally creating vulnerable hosts to monitor malicious use
recognize the purpose of a jump box
explain how proper IT governance results in secured IT resources
recognize how regulatory compliance can influence security controls
apply NIST's Cybersecurity Framework to your digital assets
apply ISO security standards to harden your environment
recognize how the TOGAF enterprise IT architecture can increase efficiency of security controls
recognize how to assess risk and apply effective security controls to mitigate that risk
recognize how to apply ITIL to increase the efficiency of IT service delivery
identify physical security controls
identify logical security controls
configure router ACL rules to block ICMP traffic
identify administrative security controls
identify compensating security controls
recognize the importance of continuous monitoring
explain how firmware must be accredited before universal trust is established
identify factors related to conducting penetration tests
list categories of security controls and threat mitigations
Course Number: cs_cybs_a03_it_enus
Expertise Level
Intermediate