CISM 2020: Detecting Security Anomalies
CISM 2020
| Intermediate
- 10 videos | 56m 26s
- Includes Assessment
- Earns a Badge
Information security managers must have the most efficient tools to detect potential security incidents at their disposal. In this course, you'll explore several tools that can be used to detect anomalies and learn how to take action to mitigate these anomalies. You'll learn to differentiate intrusion detection from intrusion prevention, before using Snort for network anomaly detection. You'll then examine how honeypots provide insight related to malicious user techniques. Next, you'll analyze various types of Windows logs, before working with logging in Linux. Lastly, you'll configure data loss prevention in the cloud, view compliance reports, and outline how SIEM and SOAR can be used for incident detection and response. This course is one of a collection of courses that prepares learners for the Certified Information Security Manager (CISM) certification.
WHAT YOU WILL LEARN
-
discover the key concepts covered in this courserecognize how security baselines can help identify potential indicators of compromiseidentify how IPD and IPS systems differdeploy Snort to detect network anomaliesrecall how honeypots and honeynets provide valuable insight related to attacker methods
-
view and filter Windows logsenable Linux logging to a central logging hostidentify cloud configuration security violationsrecognize how centralized incident and log analysis and correlation are part of an ISMSsummarize the key concepts covered in this course
IN THIS COURSE
-
1m 52s
-
5m 21s
-
6m 25s
-
9m 58s
-
4m 47s
-
8m 38s
-
6m 50s
-
6m 30s
-
5m 2s
-
1m 2s
EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE
Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.
Digital badges are yours to keep, forever.