Auditing & Incident Response
Cybersecurity
| Intermediate
- 13 Videos | 1h 8m 5s
- Includes Assessment
- Earns a Badge
This 12-video course explores selective auditing, which provides valuable insights to activity on a network, and incident response plans, which are proactive measures used to deal with negative events. Key concepts covered here include best practices related to IT security auditing and their benefits, including assurance that IT systems, business processes, and data are protected properly and that privileges are not being abused; and how to use Group Policy to enable file system auditing. Continue by observing how to scan hosts for security weaknesses from Windows and how to scan hosts for security weaknesses from Linux; and learning the importance of securing mobile devices. Next, you will learn how to centrally apply security settings to mobile devices; how to configure Amazon Web Services to use multifactor authentication; and examine how security is applied to applications from design to use. Learn how to use file hashing to detect modifications; how to specify actions used when dealing with security incidents; and learn to view a packet capture to identify suspicious activity centrally apply security settings.
WHAT YOU WILL LEARN
-
list best practices related to IT security auditinguse Group Policy to enable file system auditingscan hosts for security weaknesses from Windowsscan hosts for security weaknesses from Linuxdescribe the importance of securing mobile devicescentrally apply security settings to mobile devices
-
configure Amazon Web Services to use multifactor authenticationrecognize how security is applied to applications from design to useuse file hashing to detect modificationsspecify actions used when dealing with security incidentsview a packet capture to identify suspicious activitycentrally apply security settings
IN THIS COURSE
-
1.Course Overview1m 39sUP NEXT
-
2.Security Auditing and Accountability6m 13s
-
3.Enable Windows File System Auditing7m 23s
-
4.Conduct a Vulnerability Assessment Using Windows5m 3s
-
5.Conduct a Vulnerability Assessment Using Linux4m 30s
-
6.Mobile Device Access Control6m 58s
-
7.Configure Mobile Device Hardening Policies6m 4s
-
8.Enable a Smartphone as a Virtual MFA Device5m 10s
-
9.Securing Applications8m 42s
-
10.Implement File Hashing2m 42s
-
11.Incident Response Planning4m 34s
-
12.Examine Network Traffic for Security Incidents4m 29s
-
13.Exercise: Auditing and Incident Response4m 38s
EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE
Skillsoft is providing you the opportunity to earn a digital badge upon successful completion of this course, which can be shared on any social network or business platform
Digital badges are yours to keep, forever.