Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

Coursera

CFR: Security Assessment, Data Collection, and Log Analysis

CertNexus via Coursera

Overview

Coursera Flash Sale
40% Off Coursera Plus for 3 Months!
Grab it
In this course, you'll continue developing your cybersecurity skills by implementing cybersecurity auditing, implementing a vulnerability management plan, assessing vulnerabilities, and conducting penetration testing. Then, you'll collect cybersecurity intelligence from both network-based and host-based sources. You'll also analyze log data using common Windows and Linux tools, as well as security information and event management (SIEM) tools. This is the third course in a multi-course Specialization. All of the courses in this Specialization require that you purchase the CFR-410 LogicalLABS, which are interactive, browser-based virtual labs that simulate the activity environment. These labs are already set up with the data files, networking, and system configurations required to perform the activities. With the coupon code provided in the first course for 25% off, the labs cost approximately $60. If you already purchased the labs for the first course, you're all set.

Syllabus

  • Assessing the Organization's Security Posture
    • Now that you've analyzed the threats to your organization and their attack process, you can assess just how prepared your current security posture is to defend against these threats. The assessment process includes multiple methods and tools that will assist you in identifying weak points in the organization. More importantly, assessment will reveal how to correct these weaknesses and mitigate risk in the organization.
  • Collecting Cybersecurity Intelligence
    • Even with the most thorough testing of a security infrastructure, at some point there will be problems. You may be able to stop them as they occur and before they cause any damage, or you may have to deal with investigation of an incident that you were unable to stop. Having good security intelligence at all times will help you keep your systems secure or make them secure again.
  • Analyzing Log Data
    • Now that you've collected security intelligence from a wide variety of log-based sources, you can begin to dissect those logs to reveal key information about potential threats and vulnerabilities. Log analysis is a powerful process that can turn your security intelligence into actionable data.
  • Completing the Course
    • You'll wrap things up and then validate what you've learned in this course by taking an assessment.

Taught by

Bill Rosenthal

Reviews

Start your review of CFR: Security Assessment, Data Collection, and Log Analysis

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.