Intelligent Orchestration: Automating Security Incident Processing
IT Security
| Intermediate
- 14 Videos | 54m 57s
- Includes Assessment
- Earns a Badge
This 14-video course helps learners discover the importance of automating the responses to security incidents. Examine how security information and event management (SIEM) and security orchestration automation and response (SOAR) are related, as well as how automation and orchestration differ. The role of playbooks and machine learning in security is also covered. Begin by taking a look at security solutions that align with business objectives, then plan how security can be implemented with DevOps. Examine the relevance of security baselines, compliance reports, and regulatory compliance. Learners can observe common security tools and techniques; explore the need for proactive security incident planning; and see how to identify security incident response processes that could be automated. Differentiate between automation and orchestration solutions in IT, and describe how SIEM allows for centralized security event monitoring. Recognize the need for automated security incident triage and response; plan automation of security triage, and recall how playbooks create workflows that enable automated security incident responses. Finally, you will discover how machine learning can be used to identify potential security incidents.
WHAT YOU WILL LEARN
-
discover the key concepts covered in this courseidentify security solutions that align with business objectivesplan how security can be implemented with DevOpsidentify the relevance of security baselines, compliance reports, and regulatory compliancerecall common security tools and techniquesrecognize the need for proactive security incident planningidentify security incident response processes that could be automated
-
differentiate between automation and orchestration solutions in ITdescribe how SIEM allows for centralized security event monitoringrecognize the need for automated security incident triage and responseplan the automation of security triagerecall how playbooks create a workflow that enables automated security incident responsesdescribe how machine learning can be used to identify potential security incidentssummarize the key concepts covered in this course
IN THIS COURSE
-
1.Course Overview1m 49sUP NEXT
-
2.Security and Business Objectives2m 54s
-
3.Security and DevOps4m 21s
-
4.Security Compliance7m 50s
-
5.Attack Mitigation Tools and Techniques7m 3s
-
6.Incident Response3m 18s
-
7.Identifying Security Automation Candidates3m 45s
-
8.Automation and Orchestration2m 34s
-
9.Security Information and Event Management4m 13s
-
10.Security Orchestration Automation and Response3m 11s
-
11.Security Triage Automation4m 54s
-
12.Automation Playbooks4m 48s
-
13.Security and Machine Learning2m 57s
-
14.Course Summary1m 20s
EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE
Skillsoft is providing you the opportunity to earn a digital badge upon successful completion of this course, which can be shared on any social network or business platform
Digital badges are yours to keep, forever.