Description: Hiring trustworthy and competent personnel is often overlooked when discussing IT security. Exploits take form not only as technical entities, but also as employee workplace violations. In this course, you'll also learn how to monitor and analyze various types of systems for audit and security purposes.

Target Audience: IT specialists who will be responsible for securing and analyzing IT assets at the hardware and software levels

Duration: 02:19

Description: Firewalls are one layer of defense against unauthorized access to networks and hosts. Intrusion detection and prevention can be used to increase security at both the host and network levels. In this course, you'll learn about these security mitigations as well as malware and how to use digital forensic tools.

Target Audience: IT specialists who will be responsible for securing and analyzing IT assets at the hardware and software levels

Duration: 02:11

Description: Authentication controls who gets access to resources. Stronger authentication means greater control over resource access. In this course, you will identify weaknesses including conducting vulnerability scans in order to protect IT assets.

Target Audience: IT specialists who will be responsible for securing and analyzing IT assets at the hardware and software levels

Duration: 02:26

Description: Applying security best practices to IT system creation and deployment can go a long way in reducing the attack surface. In this course, you will learn about the SDLC, penetration testing, how to mitigate threats, and the security frameworks on which these countermeasure are based.

Target Audience: IT specialists who will be responsible for securing and analyzing IT assets at the hardware and software levels

Duration: 02:10

Description: Assets must be identified before they can be protected. This can come from documentation or IT inventories. Proactive planning streamlines incident response to minimize negative impacts to the organization.

Target Audience: IT specialists who will be responsible for securing and analyzing IT assets at the hardware and software levels

Duration: 02:25

Description: IT security analysis builds upon a solid understanding of underlying network and cloud technologies. Existing IT system implementations must be understood before security controls can be recommended.

Target Audience: IT specialists who will be responsible for securing and analyzing IT assets at the hardware and software levels

Duration: 03:07

Description: Test your knowledge on the skills and competencies measured by the vendor certification exam. TestPrep can be taken in either Study or Certification mode. Study mode is designed to maximize learning by not only testing your knowledge of the material, but also by providing additional information on the topics presented. Certification mode is designed to test your knowledge of the material within a structured testing environment, providing valuable feedback at the end of the test.

Target Audience: Individuals seeking practice in a structured testing environment, covering the skills and competencies measured by the vendor certification exam.

Duration: 02:45

Skillsoft Mentors are available to help students with their studies for exam CS0-001 CompTIA Cybersecurity Analyst+. You can reach them by entering a Mentored Chat Room or by using the Email My Mentor service.