Blue Team

Cyber Security Analyst Learning Path

Lesson 1: Explaining the Importance of Security Controls and Security Intelligence Topic 1A: Identify Security Control Types Review Activity: Security Control Types Topic 1B: Explain the Importance of Threat Data and Intelligence Review Activity: Threat Data and Intelligence Lesson 1: Practice Questions Lesson 1 PBQ: Explaining the Importance of Security Controls and Security Intelligence https://hack.technoherder.com/cybersecurity-control/ […]

Blue Team

Analyze Endpoint Monitoring Output

OBJECTIVES COVERED Given a scenario, analyze data as part of security monitoring activities. Given a scenario, implement configuration changes to existing controls to improve security. Network-based monitoring systems can be supplemented with host-based monitoring. While host-based detection methods can also rely on signature-based matching, behavioral analytics is increasingly important to cybersecurity. As an analyst, you […]