Course Content

Module 1: Introduction

00:50
1.1 Intro
08:16
1.2 Incident Response
02:11
1.3 Intro to Forensics
07:17
1.4 Forensic Investigation Process
03:46
1.5 Types of Evidence
04:04
1.6 Spares and RAID
02:46
1.7 Clustering and Web Farms
04:09
1.8 Backups

Module 2: Course Module 1

01:30
2.1 Additional Data Redundancy
01:48
2.2 Review
02:56
2.3 Intro
06:16
2.4 Why is Software Unsecure
07:08
2.5 Development Methodologies
16:47
2.6 Common Architectures

Module 3: Course Module 2

09:05
3.1 Monitoring and Auditing
07:38
3.2 Adversaries and Review
15:23
3.3 OWASP 1 thru 5
10:07
3.4 OWASP 6 thru 10
11:36
3.5 Defensive Coding
07:24
3.6 Change Management
08:02
3.7 Vulnerability Scans and Penetration Testing
04:04
3.8 Verification Validation Certification and Accreditation
01:00
3.9 DB Intro
02:25
3.10 DB Models

Module 4: Course Review

08:03
4.1 Relational Databases
04:14
4.2 Final Course Review
00:00
4.3 Security Operations

Course Description

What is the role of a Security Operations Manager? They are responsible for knowing where a network?s possible vulnerabilities are and providing mitigation strategies to combat them. An effective Cyber Security Operations Manager will have experience in a technical security role including, but not limited to: network security, data loss prevention, and penetration testing. Why do I need this certification? If you are hoping to make a transition into a role such as this one, grasping the basic concepts of security operations is essential. What will I learn? Investigations Incident management Disaster recovery Resource protection techniques Patch and vulnerability management Get your Security Operations Certification Today: Cyber Security Operations Managers are responsible for knowing where a network?s possible vulnerabilities are and providing mitigation strategies to combat them. An effective Cyber Security Operations Manager will have experience in a technical security role including, but not limited to: network security, data loss prevention, and penetration testing. The Manager also must have considerable knowledge of networking fundamentals and tools with deep experience in cyber threat intelligence analysis, security monitoring and incident response. If you are hoping to make a transition into a role such as this one, grasping the basic concepts of security operations is essential. These foundational topics generally surround investigations, incident management, and disaster recovery. The Security Operations Micro Certification covers these 3 areas, as well as resource protection techniques, patch and vulnerability management, and recovery strategies. Employers generally prefer that a candidate have industry certifications, so this skill certification test will put you on track to fill a Security Operations role.

Instructed By

Instructor Profile Image
Kelly Handerhan
Senior Instructor

Provided By

Cybrary Logo

Course Components

On Demand Videos to learn from industry leaders
Assessments to gauge understanding and comprehension

Certificate of Completion

Certificate Of Completion

Complete this entire course to earn a Security Operations Certificate of Completion