Course Content

Introduction

00:50
Part 01 - Intro
08:16
Part 02 - Incident Response
02:11
Part 03 - Intro to Forensics
07:17
Part 04 - Forensic Investigation Process
03:46
Part 05 - Types of Evidence
04:04
Part 06 - Spares and RAID
02:46
Part 07 - Clustering and Web Farms
04:09
Part 08 - Backups

Course Module 1

01:30
Part 09 - Additional Data Redundancy
01:48
Part 10 - Review
02:56
Part 01 - Intro
06:16
Part 02 - Why is Software Unsecure
07:08
Part 03 - Development Methodologies
16:47
Part 04 - Common Architectures

Course Module 2

09:05
Part 05 - Monitoring and Auditing
07:38
Part 06 - Adversaries and Review
15:23
Part 07 - OWASP 1 thru 5
10:07
Part 08 - OWASP 6 thru 10
11:36
Part 09 - Defensive Coding
07:24
Part 10 - Change Management
08:02
Part 11 - Vulnerability Scans and Penetration Testing
04:04
Part 12 - Verification Validation Certification and Accreditation
01:00
Part 13 - DB Intro
02:25
Part 14 - DB Models

Course Review

08:03
Part 15 - Relational Databases
04:14
Final Course Review
00:00
Security Operations

Course Description

What is the role of a Security Operations Manager? They are responsible for knowing where a network?s possible vulnerabilities are and providing mitigation strategies to combat them. An effective Cyber Security Operations Manager will have experience in a technical security role including, but not limited to: network security, data loss prevention, and penetration testing. Why do I need this certification? If you are hoping to make a transition into a role such as this one, grasping the basic concepts of security operations is essential. What will I learn? Investigations Incident management Disaster recovery Resource protection techniques Patch and vulnerability management Get your Security Operations Certification Today: Cyber Security Operations Managers are responsible for knowing where a network?s possible vulnerabilities are and providing mitigation strategies to combat them. An effective Cyber Security Operations Manager will have experience in a technical security role including, but not limited to: network security, data loss prevention, and penetration testing. The Manager also must have considerable knowledge of networking fundamentals and tools with deep experience in cyber threat intelligence analysis, security monitoring and incident response. If you are hoping to make a transition into a role such as this one, grasping the basic concepts of security operations is essential. These foundational topics generally surround investigations, incident management, and disaster recovery. The Security Operations Micro Certification covers these 3 areas, as well as resource protection techniques, patch and vulnerability management, and recovery strategies. Employers generally prefer that a candidate have industry certifications, so this skill certification test will put you on track to fill a Security Operations role.

Instructed By

Instructor Profile Image
Kelly Handerhan
Senior Instructor

Provided By

Cybrary Logo

Course Components

On Demand Videos from industry leaders
Assessments to gauge understanding and comprehension

Certificate of Completion

Certificate Of Completion

Complete this entire course to earn a Security Operations Certificate of Completion