Hi, This section seems to have high potential for PBQ. Might be good to include that in the overall course. Thank you for your effort in preparing this course.
I may do a standalone video on how to approach PBQs in the future, but you can certainly find many short tutorials on how to answer PBQs on RUclips already. In reality, if you have the knowledge from this course, the form of of the question will be much less important as it’s a vendor diagnostic exam. You’re not going to get any vendor-specific hands-on questions.
@@InsideCloudAndSecurity Thanks, yeah I know about the videos where people go over sample PBQ on RUclips. I have watched them before and it gave me a nice idea of what to expect. I was just thinking along the lines of them giving you logs in question and you having to identify the compromise based on the logs.
Thanks, Pete! This was very helpful as security operations has been my weakest domain. I'm feeling more confident and ready to take my exam on Sunday!
Glad it was helpful! Just published 5.2 Risk Management. Super important because of the risk analysis formulas. Good luck this weekend!
Hi. When you will be done with the complete set for domain 4? I have been waiting for it! Your series absolutely help me a lots!
Hopefully you found domains 4 and 5 in the playlist?
Hi, This section seems to have high potential for PBQ. Might be good to include that in the overall course. Thank you for your effort in preparing this course.
I may do a standalone video on how to approach PBQs in the future, but you can certainly find many short tutorials on how to answer PBQs on RUclips already. In reality, if you have the knowledge from this course, the form of of the question will be much less important as it’s a vendor diagnostic exam. You’re not going to get any vendor-specific hands-on questions.
@@InsideCloudAndSecurity Thanks, yeah I know about the videos where people go over sample PBQ on RUclips. I have watched them before and it gave me a nice idea of what to expect. I was just thinking along the lines of them giving you logs in question and you having to identify the compromise based on the logs.