Cyber Security Audits

IT Security    |    Intermediate
  • 14 videos | 1h 39m 51s
  • Includes Assessment
  • Earns a Badge
Rating 4.5 of 434 users Rating 4.5 of 434 users (434)
In this 14-video course, learners will explore cybersecurity auditing concepts and the NIST Cybersecurity Framework, how they can improve infrastructure security, and how to perform cybersecurity assessments. Examine web application auditing and approaches for securing web applications. Key concepts covered here include cybersecurity auditing concepts and how they are used to improve infrastructure security; steps used in performing cybersecurity assessments; and how to examine audit review, analysis, and reporting. Next, learn how to use the Wireshark network security auditing tool; how to use the Nmap perimeter security tool; how to perform web application auditing and secure web application and websites; and how to monitor and audit Windows by using audit policies and Event Viewer. Then learn how to monitor the Linux system by reviewing system logs; learn how to use Tiger security audit and intrusion detection tool; and examine guidelines and standards for defining cybersecurity audit strategies. Finally, learn about available security audit tools and their features and benefits; and learn to use Nessus audit tool to run Nessus security system scans.

WHAT YOU WILL LEARN

  • Discover the key concepts covered in this course
    Describe cyber security auditing concepts and the nist cybersecurity framework and how they are used to improve infrastructure security
    Describe how to perform a cyber security assessment
    Describe audit review, analysis, and reporting
    Use the wireshark network security auditing tool
    Use the nmap perimeter security tool
    Describe how to perform web application auditing and secure web application and web sites
  • Describe how to monitor and audit windows using audit policies and the event viewer
    Describe how to monitor the linux system by reviewing system logs
    Use the tiger security audit and intrusion detection tool
    Describe guidelines and standards for defining cyber security audit strategies
    Compare available security audit tools and outline their features and benefits
    Use the nessus audit tool to run a nessus security system scan
    Summarize the key concepts covered in this course

IN THIS COURSE

  • 1m 34s
  • 7m 37s
    Upon completion of this video, you will be able to describe cyber security auditing concepts, the NIST Cybersecurity Framework, and how they are used to improve infrastructure security. FREE ACCESS
  • Locked
    3.  Cyber Security Assessment
    6m 2s
    Upon completion of this video, you will be able to describe how to perform a cyber security assessment. FREE ACCESS
  • Locked
    4.  Cyber Security Reporting
    4m 23s
    After completing this video, you will be able to describe audit review, analysis, and reporting. FREE ACCESS
  • Locked
    5.  Network Security Auditing
    11m 22s
    Learn how to use the Wireshark network security auditing tool. FREE ACCESS
  • Locked
    6.  Perimeter Security Auditing
    11m 50s
    In this video, find out how to use the nmap tool for perimeter security. FREE ACCESS
  • Locked
    7.  Web Application Auditing
    8m 23s
    After completing this video, you will be able to describe how to perform web application auditing and secure web applications and websites. FREE ACCESS
  • Locked
    8.  Windows Security Monitoring and Auditing
    7m 54s
    After completing this video, you will be able to describe how to monitor and audit Windows using audit policies and the Event Viewer. FREE ACCESS
  • Locked
    9.  Linux Security Monitoring
    7m 42s
    Upon completion of this video, you will be able to describe how to monitor the Linux system by reviewing system logs. FREE ACCESS
  • Locked
    10.  Linux Security Auditing
    5m 59s
    In this video, you will use the Tiger security audit and intrusion detection tool. FREE ACCESS
  • Locked
    11.  Cyber Security Audit Strategy
    5m 57s
    After completing this video, you will be able to describe guidelines and standards for defining cyber security audit strategies. FREE ACCESS
  • Locked
    12.  Security Audit Tools
    5m 1s
    Learn how to compare available security audit tools, outlining their features and benefits. FREE ACCESS
  • Locked
    13.  Nessus Audit Tool
    15m 15s
    Learn how to use the Nessus audit tool to run a Nessus security system scan. FREE ACCESS
  • Locked
    14.  Course Summary
    51s

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE

Rating 4.4 of 17 users Rating 4.4 of 17 users (17)
Rating 4.6 of 30 users Rating 4.6 of 30 users (30)
Rating 5.0 of 4 users Rating 5.0 of 4 users (4)

PEOPLE WHO VIEWED THIS ALSO VIEWED THESE

Rating 4.4 of 106 users Rating 4.4 of 106 users (106)
Rating 4.5 of 179 users Rating 4.5 of 179 users (179)
Rating 4.2 of 1472 users Rating 4.2 of 1472 users (1472)