Auditing & Incident Response

Cybersecurity    |    Intermediate
  • 13 Videos | 1h 13m 35s
  • Includes Assessment
  • Earns a Badge
Likes 29 Likes 29
This 12-video course explores selective auditing, which provides valuable insights to activity on a network, and incident response plans, which are proactive measures used to deal with negative events. Key concepts covered here include best practices related to IT security auditing and their benefits, including assurance that IT systems, business processes, and data are protected properly and that privileges are not being abused; and how to use Group Policy to enable file system auditing. Continue by observing how to scan hosts for security weaknesses from Windows and how to scan hosts for security weaknesses from Linux; and learning the importance of securing mobile devices. Next, you will learn how to centrally apply security settings to mobile devices; how to configure Amazon Web Services to use multifactor authentication; and examine how security is applied to applications from design to use. Learn how to use file hashing to detect modifications; how to specify actions used when dealing with security incidents; and learn to view a packet capture to identify suspicious activity centrally apply security settings.

WHAT YOU WILL LEARN

  • list best practices related to IT security auditing
    use Group Policy to enable file system auditing
    scan hosts for security weaknesses from Windows
    scan hosts for security weaknesses from Linux
    describe the importance of securing mobile devices
    centrally apply security settings to mobile devices
  • configure Amazon Web Services to use multifactor authentication
    recognize how security is applied to applications from design to use
    use file hashing to detect modifications
    specify actions used when dealing with security incidents
    view a packet capture to identify suspicious activity
    centrally apply security settings

IN THIS COURSE

  • Playable
    1. 
    Course Overview
    1m 39s
    UP NEXT
  • Playable
    2. 
    Security Auditing and Accountability
    6m 13s
  • Locked
    3. 
    Enable Windows File System Auditing
    7m 23s
  • Locked
    4. 
    Conduct a Vulnerability Assessment Using Windows
    5m 3s
  • Locked
    5. 
    Conduct a Vulnerability Assessment Using Linux
    4m 30s
  • Locked
    6. 
    Mobile Device Access Control
    6m 58s
  • Locked
    7. 
    Configure Mobile Device Hardening Policies
    6m 4s
  • Locked
    8. 
    Enable a Smartphone as a Virtual MFA Device
    5m 10s
  • Locked
    9. 
    Securing Applications
    8m 42s
  • Locked
    10. 
    Implement File Hashing
    2m 42s
  • Locked
    11. 
    Incident Response Planning
    4m 34s
  • Locked
    12. 
    Examine Network Traffic for Security Incidents
    4m 29s
  • Locked
    13. 
    Exercise: Auditing and Incident Response
    4m 38s

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion of this course, which can be shared on any social network or business platform

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE

Likes 22 Likes 22  
Likes 10 Likes 10  
Likes 26 Likes 26  

PEOPLE WHO VIEWED THIS ALSO VIEWED THESE