Intelligent Orchestration: Automating Security Incident Processing

IT Security    |    Intermediate
  • 14 videos | 54m 57s
  • Includes Assessment
  • Earns a Badge
Rating 4.6 of 181 users Rating 4.6 of 181 users (181)
This 14-video course helps learners discover the importance of automating the responses to security incidents. Examine how security information and event management (SIEM) and security orchestration automation and response (SOAR) are related, as well as how automation and orchestration differ. The role of playbooks and machine learning in security is also covered. Begin by taking a look at security solutions that align with business objectives, then plan how security can be implemented with DevOps. Examine the relevance of security baselines, compliance reports, and regulatory compliance. Learners can observe common security tools and techniques; explore the need for proactive security incident planning; and see how to identify security incident response processes that could be automated. Differentiate between automation and orchestration solutions in IT, and describe how SIEM allows for centralized security event monitoring. Recognize the need for automated security incident triage and response; plan automation of security triage, and recall how playbooks create workflows that enable automated security incident responses. Finally, you will discover how machine learning can be used to identify potential security incidents.

WHAT YOU WILL LEARN

  • Discover the key concepts covered in this course
    Identify security solutions that align with business objectives
    Plan how security can be implemented with devops
    Identify the relevance of security baselines, compliance reports, and regulatory compliance
    Recall common security tools and techniques
    Recognize the need for proactive security incident planning
    Identify security incident response processes that could be automated
  • Differentiate between automation and orchestration solutions in it
    Describe how siem allows for centralized security event monitoring
    Recognize the need for automated security incident triage and response
    Plan the automation of security triage
    Recall how playbooks create a workflow that enables automated security incident responses
    Describe how machine learning can be used to identify potential security incidents
    Summarize the key concepts covered in this course

IN THIS COURSE

  • 1m 49s
  • 2m 54s
    Find out how to identify security solutions that align with your business objectives. FREE ACCESS
  • Locked
    3.  Security and DevOps
    4m 21s
    In this video, you will learn how to implement security with DevOps. FREE ACCESS
  • Locked
    4.  Security Compliance
    7m 50s
    In this video, learn how to identify the relevance of security baselines, compliance reports, and regulatory compliance. FREE ACCESS
  • Locked
    5.  Attack Mitigation Tools and Techniques
    7m 3s
    Upon completion of this video, you will be able to recall common security tools and techniques. FREE ACCESS
  • Locked
    6.  Incident Response
    3m 18s
    After completing this video, you will be able to recognize the need for proactive security incident planning. FREE ACCESS
  • Locked
    7.  Identifying Security Automation Candidates
    3m 45s
    In this video, you will identify security incident response processes that can be automated. FREE ACCESS
  • Locked
    8.  Automation and Orchestration
    2m 34s
    Find out how to differentiate between automation and orchestration solutions in IT. FREE ACCESS
  • Locked
    9.  Security Information and Event Management
    4m 13s
    Upon completion of this video, you will be able to describe how SIEM allows for centralized security event monitoring. FREE ACCESS
  • Locked
    10.  Security Orchestration Automation and Response
    3m 11s
    Upon completion of this video, you will be able to recognize the need for automated security incident response. FREE ACCESS
  • Locked
    11.  Security Triage Automation
    4m 54s
    In this video, you will learn how to automate security triage. FREE ACCESS
  • Locked
    12.  Automation Playbooks
    4m 48s
    Upon completion of this video, you will be able to recall how playbooks create a workflow that enables automated security incident responses. FREE ACCESS
  • Locked
    13.  Security and Machine Learning
    2m 57s
    Upon completion of this video, you will be able to describe how machine learning can be used to identify potential security incidents. FREE ACCESS
  • Locked
    14.  Course Summary
    1m 20s

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE

Rating 4.8 of 44 users Rating 4.8 of 44 users (44)
Rating 4.3 of 6 users Rating 4.3 of 6 users (6)
Rating 4.5 of 82 users Rating 4.5 of 82 users (82)

PEOPLE WHO VIEWED THIS ALSO VIEWED THESE

Rating 4.5 of 342 users Rating 4.5 of 342 users (342)
Rating 4.6 of 48 users Rating 4.6 of 48 users (48)
Rating 4.5 of 67 users Rating 4.5 of 67 users (67)