Monitoring & Securing System Configuration
IT Security
| Intermediate
- 14 Videos | 1h 16m 10s
- Includes Assessment
- Earns a Badge
In this 14-video course, you will learn how to drive system configuration monitoring by using tools to keep systems secure and the importance of monitoring system configuration within an organization for incident response. Key concepts covered here include the configuration management (CM) process and how it can influence securing system configuration for incident response; tools and software to monitor systems and their advantages for incident response; and continuous monitoring in risk management, including the three-tier approach. Next, learn the process of minor, major, and unknown configuration changes; learn the importance of securing CM processes in the software development lifecycle (SDLC) for preventing security impacts; and observe methods for identifying common high probability items, such as identifying default or weak credentials. Continue by learning to implement a secure system CM program; and how to assess the monitoring process and perform security configuration evaluations. Finally, observe methods of monitoring releases and deliveries throughout SDLC; learn security controls for monitoring system configuration in a cyber framework; and learn how monitoring system configuration is important in today's enterprise SDLC.
WHAT YOU WILL LEARN
-
discover the key concepts covered in this coursedescribe the configuration management process and how it can influence securing system configuration for incident responsedescribe tools and software available to monitor systems and their advantages for incident responsedescribe continuous monitoring in risk management, including the three-tier approach and how it relates to monitoring system configurationrecognize the process of minor, major, and unknown configuration changes, including what it means to an organization in terms of incident response and how they are prioritized in an incident strategyrecognize the importance of securing the CM process in the SDLC for preventing security impactsrecognize methods for identifying common high probability items, such as identifying default or weak credentials
-
describe the process of implementing a secure system configuration monitoring programassess the monitoring process and perform a security configuration evaluationrecognize methods of monitoring releases and deliveries throughout the software development lifecycledescribe security controls for monitoring system configuration in a cyber frameworkrecognize challenges organizations face today in monitoring system configuration and how they can be overcomerecognize how monitoring system configuration is important in today's enterprise SDLCsummarize the key concepts covered in this course
IN THIS COURSE
-
1.Course Overview1m 47sUP NEXT
-
2.System Configuration Process for Incident Response7m 39s
-
3.Tools for Monitoring System Configuration4m 58s
-
4.Continuous Monitoring in System Configuration4m 58s
-
5.Monitoring Change Management by Priority5m 39s
-
6.CM and Securing System Configuration3m 37s
-
7.Identifying Red Flags when Monitoring Systems6m 34s
-
8.Implementing a Monitoring Program5m 42s
-
9.Assessing the Monitoring of Configuration3m 7s
-
10.Securing System Releases and Deliveries10m 4s
-
11.Security Controls for Monitoring Configurations5m 56s
-
12.Monitoring System Configuration Challenges8m 58s
-
13.Importance of Monitoring System Configuration5m 49s
-
14.Course Summary1m 22s
EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE
Skillsoft is providing you the opportunity to earn a digital badge upon successful completion of this course, which can be shared on any social network or business platform
Digital badges are yours to keep, forever.