1 00:00:06,620 --> 00:00:10,420 - Welcome to Lesson 1, Cybersecurity Fundamentals. 2 00:00:10,420 --> 00:00:14,570 This lesson starts by comparing security deployments: 3 00:00:14,570 --> 00:00:18,200 Network, endpoint, and application security systems. 4 00:00:18,200 --> 00:00:20,570 You will also learn about agentless 5 00:00:20,570 --> 00:00:23,310 and agent-based protections, 6 00:00:23,310 --> 00:00:27,180 legacy antivirus and antimalware, and the differences 7 00:00:27,180 --> 00:00:30,730 between Security Information Event Management platforms, 8 00:00:30,730 --> 00:00:35,190 and new Security Orchestration, Automation, and Response, 9 00:00:35,190 --> 00:00:37,053 and XDR solutions. 10 00:00:37,910 --> 00:00:42,350 This lesson also cover details about threat intelligence, 11 00:00:42,350 --> 00:00:45,450 threat hunting, malware analysis, 12 00:00:45,450 --> 00:00:50,240 and how to interpret the output of malware analysis tools. 13 00:00:50,240 --> 00:00:53,710 You will also learn the different threat actor types, 14 00:00:53,710 --> 00:00:56,200 details about Run Book Automation, 15 00:00:56,200 --> 00:00:58,623 and concepts of reverse engineering.