Preemptive Troubleshooting: Concepts & Strategies

IT Security    |    Intermediate
  • 14 Videos | 1h 30m 53s
  • Includes Assessment
  • Earns a Badge
Likes 13 Likes 13
Explore preemptive troubleshooting for your organization's cyber security in this 14-video course, which examines available strategies, tools, best practices, and security policies to keep your system secure. First, you will examine how preemptive troubleshooting applies to security in SecOps and how it is different from intrusion detection systems and intrusion prevention systems. This course then demonstrates several scenarios that a SOC (security operations center) can use when troubleshooting network issues and system compromise. Learn best practices, including spotting weak passwords, hardware and software vulnerabilities, and security policies and procedures to keep systems secure. You will also learn how to use password policies, auditing, and how to prevent security compromises. This course demonstrates how threat hunters can help spot threats before they occur. Learners will study the policies and tools for troubleshooting hardware. Finally, you will learn how software and hardware update policies can aid in keeping system secure, and how preemptive resolution and training can help an organization to better secure its systems.

WHAT YOU WILL LEARN

  • discover the key concepts covered in this course
    describe preemptive troubleshooting and how it applies to security and SecOps
    recognize how preemptive troubleshooting is different than intrusion detection systems
    describe policies and procedures for keeping systems secure in preemptive troubleshooting
    use tools to troubleshoot hardware and policies to prevent security compromise
    use password policies to enforce compliance
    update software and recognize the importance of doing so
  • update hardware and recognize the importance of doing so
    describe how indicators of compromise can help reduce exploits in an environment
    identify how a security operations center can be a vital asset to an organization
    recognize how threat hunters can help spot threats before they occur
    differentiate between being preemptive and reactive in troubleshooting
    demonstrate how training can keep an organization secure
    summarize the key concepts covered in this course

IN THIS COURSE

  • Playable
    1. 
    Course Overview
    1m 50s
    UP NEXT
  • Playable
    2. 
    Preemptive Troubleshooting Concepts
    6m 55s
  • Locked
    3. 
    What Makes Preemptive Troubleshooting Different?
    5m 23s
  • Locked
    4. 
    Preemptive Troubleshooting Policies and Procedures
    7m 18s
  • Locked
    5. 
    Preemptive Troubleshooting Tools at Work
    6m 32s
  • Locked
    6. 
    Identifying Weak Passwords
    8m 57s
  • Locked
    7. 
    Using Software Update Policies
    6m 59s
  • Locked
    8. 
    Hardware Updates and Policies
    7m 11s
  • Locked
    9. 
    Indicators of Compromise
    6m 35s
  • Locked
    10. 
    Security Operations Center
    6m 20s
  • Locked
    11. 
    Threat Hunters
    5m
  • Locked
    12. 
    Preemptive vs. Reactive
    7m 4s
  • Locked
    13. 
    Preemptive Scenarios
    7m 17s
  • Locked
    14. 
    Course Summary
    1m 34s

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion of this course, which can be shared on any social network or business platform

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE

Likes 0 Likes 0