Environment Monitoring, Retention, and Data Logging

Cybersecurity    |    Beginner
  • 23 Videos | 53m 46s
  • Includes Assessment
  • Earns a Badge
Logging is used to record events that occur within an organization's systems and networks. Oftentimes, logging information can help with the identification and isolation of any intruder or malware. In this course, explore acceptable use policies (AUP) and how they apply to employee monitoring. Discover how monitoring as a service can benefit an organization, and explore devices that can be monitored on a network including routers, switches, laptops, and wireless access points. Explore how retention policies can identify how long different types of data are maintained and discover when to implement a centralized enterprise logging service. Lastly, explore how keystroke loggers can capture and track what is typed on a keyboard and learn the importance of protecting log information.

WHAT YOU WILL LEARN

  • discover the key concepts covered in this course
    discuss acceptable use policies (AUP) and how they apply to employee monitoring
    discuss whether your company monitor your personal life
    provide an overview of monitoring as a service and recognize how it can benefit an organization
    differentiate between the different types of monitoring including onsite, remote, system, employee, location, and usage and consumption
    list devices that can be monitored on a network including routers, switches, laptops, and wireless access points
    recognize questions to ask when developing a monitoring policy
    discuss how much monitoring is acceptable
    provide an overview of physical monitoring
    differentiate between physical and IT security monitoring and how they can intersect
    discuss how retention policies should identify how long different types of data are maintained
    discuss data retention including items such as old e-mails in your corporate e-mail account
  • provide an overview of Group id's and how they allow multiple users access under a single set of identification credentials
    differentiate between monitoring and logging
    outline benefits for both monitoring and logging practices
    recognize when to implement a centralized enterprise logging service
    provide an overview of which types of information that can be logged
    discuss how keystroke loggers capture and track what is typed on a keyboard
    recognize the importance of having a properly implemented and supported enterprise-wide log management infrastructure in place
    describe the importance of protecting log information
    discuss how can log information be manipulated to aid an attacker
    describe how network time protocol (NTP) attacks can be used to alter log file timestamps
    recognize how metrics measure the success of the security program

IN THIS COURSE