Cyber Security Audits
IT Security
| Intermediate
- 14 Videos | 1h 39m 51s
- Includes Assessment
- Earns a Badge
In this 14-video course, learners will explore cybersecurity auditing concepts and the NIST Cybersecurity Framework, how they can improve infrastructure security, and how to perform cybersecurity assessments. Examine web application auditing and approaches for securing web applications. Key concepts covered here include cybersecurity auditing concepts and how they are used to improve infrastructure security; steps used in performing cybersecurity assessments; and how to examine audit review, analysis, and reporting. Next, learn how to use the Wireshark network security auditing tool; how to use the Nmap perimeter security tool; how to perform web application auditing and secure web application and websites; and how to monitor and audit Windows by using audit policies and Event Viewer. Then learn how to monitor the Linux system by reviewing system logs; learn how to use Tiger security audit and intrusion detection tool; and examine guidelines and standards for defining cybersecurity audit strategies. Finally, learn about available security audit tools and their features and benefits; and learn to use Nessus audit tool to run Nessus security system scans.
WHAT YOU WILL LEARN
-
discover the key concepts covered in this coursedescribe cyber security auditing concepts and the NIST Cybersecurity Framework and how they are used to improve infrastructure securitydescribe how to perform a cyber security assessmentdescribe audit review, analysis, and reportinguse the Wireshark network security auditing tooluse the nmap perimeter security tooldescribe how to perform web application auditing and secure web application and web sites
-
describe how to monitor and audit Windows using audit policies and the Event Viewerdescribe how to monitor the Linux system by reviewing system logsuse the Tiger security audit and intrusion detection tooldescribe guidelines and standards for defining cyber security audit strategiescompare available security audit tools and outline their features and benefitsuse the Nessus audit tool to run a Nessus security system scansummarize the key concepts covered in this course
IN THIS COURSE
-
1.Course Overview1m 34sUP NEXT
-
2.Cyber Security Auditing7m 37s
-
3.Cyber Security Assessment6m 2s
-
4.Cyber Security Reporting4m 23s
-
5.Network Security Auditing11m 22s
-
6.Perimeter Security Auditing11m 50s
-
7.Web Application Auditing8m 23s
-
8.Windows Security Monitoring and Auditing7m 54s
-
9.Linux Security Monitoring7m 42s
-
10.Linux Security Auditing5m 59s
-
11.Cyber Security Audit Strategy5m 57s
-
12.Security Audit Tools5m 1s
-
13.Nessus Audit Tool15m 15s
-
14.Course Summary51s
EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE
Skillsoft is providing you the opportunity to earn a digital badge upon successful completion of this course, which can be shared on any social network or business platform
Digital badges are yours to keep, forever.