Monitoring & Reporting

Expert
  • 9 videos | 51m 38s
  • Includes Assessment
  • Earns a Badge
Rating 4.5 of 47 users Rating 4.5 of 47 users (47)
Discover security principles and management tasks of continuous security operations and initiatives. Learn about protocol analyzers, network scanners, vulnerability scanners, and other continuous monitoring systems. Review egress monitors as well as security information and event management (SIEM) systems. Examine various types of intrusion detection and prevention methods, such as NIDS and NIPS. Walk through forensic investigative processes. Explore digital forensics tools, tactics, and procedures. Observe reporting and documentation techniques, as part of a post-incident response, including root cause analysis and an after-action report of lessons learned.

WHAT YOU WILL LEARN

  • Describe continuous monitoring
    Define egress monitoring
    Recognize siem systems
    Describe ids and ips
    Compare investigative techniques
  • Collect and handle evidence
    Describe digital forensics tools, tactics, and procedures
    Report and document thoroughly
    Describe security management of operations

IN THIS COURSE

  • 8m 55s
    After watching this video, you will be able to describe continuous monitoring. FREE ACCESS
  • 7m 27s
    In this video, you will learn how to define egress monitoring. FREE ACCESS
  • Locked
    3.  Security Information and Event Management (SIEM)
    4m 8s
    After completing this video, you will be able to recognize SIEM systems. FREE ACCESS
  • Locked
    4.  Intrusion Detection and Prevention
    11m 21s
    Upon completion of this video, you will be able to describe IDS and IPS. FREE ACCESS
  • Locked
    5.  Investigative Techniques
    6m 5s
    To compare investigative techniques, please consult the following resources. FREE ACCESS
  • Locked
    6.  Evidence Collection and Handling
    3m 43s
    In this video, you will collect and handle evidence correctly. FREE ACCESS
  • Locked
    7.  Digital Forensics Tools, Tactics, and Procedures
    4m 58s
    After completing this video, you will be able to describe digital forensics tools, tactics, and procedures. FREE ACCESS
  • Locked
    8.  Reporting and Documentation
    2m 39s
    Learn how to report and document thoroughly. FREE ACCESS
  • Locked
    9.  Exercise: Describe Security Management of Operations
    2m 23s
    Upon completion of this video, you will be able to describe security management of operations. FREE ACCESS

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE

Rating 5.0 of 3 users Rating 5.0 of 3 users (3)
Rating 4.6 of 22 users Rating 4.6 of 22 users (22)

PEOPLE WHO VIEWED THIS ALSO VIEWED THESE

Rating 4.7 of 6 users Rating 4.7 of 6 users (6)
Rating 4.6 of 125 users Rating 4.6 of 125 users (125)
Rating 4.5 of 292 users Rating 4.5 of 292 users (292)