CISA 2022: Continuous Monitoring

CISA    |    Expert
  • 11 videos | 1h 6m 52s
  • Includes Assessment
  • Earns a Badge
Rating 5.0 of 3 users Rating 5.0 of 3 users (3)
Enterprise systems have continuous monitoring needs, of both business processes and supporting IT solutions. Information systems (IS) auditing can identify where improvements can be made. In this course, you will explore continuous monitoring, beginning with an overview of continuous monitoring, business processes, and sampling types. Then you will discover how to filter Windows logs and forward Linux logs. Next, you will focus on packet capturing placement and analysis. Finally, you will dig into security information and event management (SIEM), intrusion detection systems (IDSs), and intrusion prevention systems (IPSs). This course helps prepare learners for the ISACA certification exam, Certified Information Systems Auditor (CISA).

WHAT YOU WILL LEARN

  • Discover the key concepts covered in this course
    Describe how monitoring is an important aspect of the information systems (is) auditing process
    Outline the importance of monitoring business processes for continuous process improvement
    Describe how sampling types like attribute, variable, statistical, and discovery sampling play a role in the audit process
    Filter windows logs to show only relevant log entries
    Send windows log events to a centralized logging host
  • Plan optimal settings for packet capturing placement and configuration
    Provide an overview of how siem systems provide centralized security event monitoring and management
    Outline how an ids can identify suspicious host and network activity
    Describe the purpose of an ips and compare and contrast it with an ids
    Summarize the key concepts covered in this course

IN THIS COURSE

  • 56s
    In this video, we will discover the key concepts covered in this course. FREE ACCESS
  • 7m 45s
    After completing this video, you will be able to describe how monitoring is an important aspect of the information systems (IS) auditing process. FREE ACCESS
  • Locked
    3.  Business Processes
    5m 2s
    Upon completion of this video, you will be able to outline the importance of monitoring business processes for continuous process improvement. FREE ACCESS
  • Locked
    4.  Sampling Types
    5m 31s
    After completing this video, you will be able to describe how sampling types like attribute, variable, statistical, and discovery sampling play a role in the audit process. FREE ACCESS
  • Locked
    5.  Filtering Windows Logs
    10m 11s
    In this video, find out how to filter Windows logs to show only relevant log entries. FREE ACCESS
  • Locked
    6.  Forwarding Windows Logs
    12m 5s
    During this video, you will learn how to send Windows log events to a centralized logging host. FREE ACCESS
  • Locked
    7.  Packet Capturing Placement
    7m 32s
    Discover how to plan optimal settings for packet capturing placement and configuration. FREE ACCESS
  • Locked
    8.  Security Information and Event Management (SIEM)
    6m 13s
    Upon completion of this video, you will be able to provide an overview of how SIEM systems provide centralized security event monitoring and management. FREE ACCESS
  • Locked
    9.  Intrusion Detection Systems (IDSs)
    5m 10s
    After completing this video, you will be able to outline how an IDS can identify suspicious host and network activity. FREE ACCESS
  • Locked
    10.  Intrusion Prevention Systems (IPSs)
    5m 37s
    Upon completion of this video, you will be able to describe the purpose of an IPS and compare and contrast it with an IDS. FREE ACCESS
  • Locked
    11.  Course Summary
    50s
    In this video, we will summarize the key concepts covered in this course. FREE ACCESS

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE

Rating 4.8 of 44 users Rating 4.8 of 44 users (44)
Rating 4.0 of 1 users Rating 4.0 of 1 users (1)
Rating 4.8 of 52 users Rating 4.8 of 52 users (52)