SecOps Engineer: Threat Mitigation


Overview/Description
Expected Duration
Lesson Objectives
Course Number
Expertise Level



Overview/Description

This course explores the general concepts of threat mitigation for SecOps (security and operations) engineers. In this 13 videos, learners will observe the three basic concepts for threat mitigation and threat intelligence: identification, prevention, and responses. This course examines acceptable risk levels. You will analyze malware classification, such as viruses, worms, logic bombs, and backdoor software. You will learn to mitigation malware, and threats to websites; and examine types of ransomware, including Cryptolocker, Cryptowall, WannaCry, and Bad Rabbit, as well as explore possible solutions. You will learn how DoS (denial of service) is conducted, and see examples of specific attacks; then examine cross-Site Scripting, parameter traversal, and cross-Site Request Forgery. You will learn to address insider threats, and how to mitigate social engineering, phishing, and insecure protocols. Learners will examine how to integrate analysis into mitigating these threats. Finally, this course explores cyberthreat intelligence, and suggests that you subscribe to the National Vulnerability Database, and its feeds.



Expected Duration (hours)
1.0

Lesson Objectives

SecOps Engineer: Threat Mitigation

  • discover the key concepts covered in this course
  • describe and integrate threat mitigation concepts into security operations
  • analyze and mitigate malware threats
  • describe approaches to ransomware mitigation
  • describe threats to websites
  • respond effectively to DoS attacks
  • analyze the danger of insider threats and take mitigating steps
  • integrate mitigation for social engineering into security operations
  • describe the threats posed by phishing and integrate mitigation steps into security operations
  • describe the threat of using insecure protocols and how to mitigate that threat
  • use cyberthreat intelligence and integrate it into mitigation strategies
  • use cyberthreat intelligence resources effectively
  • summarize the key concepts covered in this course
  • Course Number:
    it_sosecodj_05_enus

    Expertise Level
    Intermediate