Autoplay
Autocomplete
Previous Lesson
Complete and Continue
CompTIA SecurityX
Summarizing Governance, Risk, and Compliance
Implement Appropriate Governance Components (19:47)
Explain Legal Compliance Lesson (12:48)
Apply Risk Management Strategies (20:39)
Explore the VM Lab Environment (18:19)
Implementing Architecture and Design
Apply Software Development (15:07)
Integrate Software Architecture (15:12)
Support Operational Resilience (16:31)
Implement Cloud Infrastructure (26:33)
Integrate Zero Trust Concepts (14:59)
Troubleshoot Using AAA and IAM (24:19)
Dynamic Application Security Testing (DAST) (37:41)
Evaluating Attack Surface Management and Reduction (37:54)
Designing a CI/CD Pipeline (25:22)
Evaluating Information and Data Security Design (15:30)
Configuring Intrusion Detection Systems (IDS) (36:55)
Testing a Web Application Firewall (WAF) (18:03)
Investigating and Remediating Vulnerabilities (23:24)
Detecting Shadow IT (18:28)
Implementing API Security (20:09)
Securing Kubernetes Deployments in Azure (21:11)
Implementing Continuous Authentication (34:27)
Understanding Security Engineering
Enhance Endpoint Security (20:41)
Configure Network Infrastructure (21:33)
Initiate Security Automation (14:55)
Apply Cryptography Concepts (25:04)
Configuring HIPS/HIDS (Host-Based Intrusion Protection System/Host-Based Detection System) (28:51)
Implementing Host-Based Firewalls (29:57)
Troubleshooting Network Misconfigurations (27:21)
Implementing Event-Based Triggers (19:05)
Apply Security Orchestration, Automate, and Response (SOAR) Framework (23:06)
Applying Security Operations and Incident Response
Perform Threat Modeling (12:26)
Examine Security Monitoring (11:35)
Analyze Known Attack Methods and Associated Mitigations (20:25)
Apply Threat Hunting Tools and Technologies (12:06)
Evaluate Incident Analysis and Response (11:22)
Implementing MITRE ATT@CK Framework (11:22)
Establishing Behavior Baselines and Analytics (31:28)
Logging Auditing and Alerting (14:36)
Investigating External Intelligence Sources (26:06)
Investigating Indicators of Compromise (IoC) (34:30)
Auditing Indicators of Attack (15:39)
Conducting Malware Analysis (22:29)
Extracting and Analyzing Metadata (23:14)
Implementing MITRE ATT@CK Framework
Lesson content locked
If you're already enrolled,
you'll need to login
.
Enroll in Course to Unlock