Cyber Security Audits

IT Security
  • 14 Videos | 1h 45m 51s
  • Includes Assessment
  • Earns a Badge
Likes 51 Likes 51
In this 14-video course, learners will explore cybersecurity auditing concepts and the NIST Cybersecurity Framework, how they can improve infrastructure security, and how to perform cybersecurity assessments. Examine web application auditing and approaches for securing web applications. Key concepts covered here include cybersecurity auditing concepts and how they are used to improve infrastructure security; steps used in performing cybersecurity assessments; and how to examine audit review, analysis, and reporting. Next, learn how to use the Wireshark network security auditing tool; how to use the Nmap perimeter security tool; how to perform web application auditing and secure web application and websites; and how to monitor and audit Windows by using audit policies and Event Viewer. Then learn how to monitor the Linux system by reviewing system logs; learn how to use Tiger security audit and intrusion detection tool; and examine guidelines and standards for defining cybersecurity audit strategies. Finally, learn about available security audit tools and their features and benefits; and learn to use Nessus audit tool to run Nessus security system scans.

WHAT YOU WILL LEARN

  • discover the key concepts covered in this course
    describe cyber security auditing concepts and the NIST Cybersecurity Framework and how they are used to improve infrastructure security
    describe how to perform a cyber security assessment
    describe audit review, analysis, and reporting
    use the Wireshark network security auditing tool
    use the nmap perimeter security tool
    describe how to perform web application auditing and secure web application and web sites
  • describe how to monitor and audit Windows using audit policies and the Event Viewer
    describe how to monitor the Linux system by reviewing system logs
    use the Tiger security audit and intrusion detection tool
    describe guidelines and standards for defining cyber security audit strategies
    compare available security audit tools and outline their features and benefits
    use the Nessus audit tool to run a Nessus security system scan
    summarize the key concepts covered in this course

IN THIS COURSE

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion of this course, which can be shared on any social network or business platform

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE

Likes 23 Likes 23  
Likes 4 Likes 4  

PEOPLE WHO VIEWED THIS ALSO VIEWED THESE

Likes 354 Likes 354  
Likes 162 Likes 162