Auditing & Incident Response

Cybersecurity    |    Intermediate
  • 13 videos | 1h 8m 5s
  • Includes Assessment
  • Earns a Badge
Rating 4.4 of 60 users Rating 4.4 of 60 users (60)
This 12-video course explores selective auditing, which provides valuable insights to activity on a network, and incident response plans, which are proactive measures used to deal with negative events. Key concepts covered here include best practices related to IT security auditing and their benefits, including assurance that IT systems, business processes, and data are protected properly and that privileges are not being abused; and how to use Group Policy to enable file system auditing. Continue by observing how to scan hosts for security weaknesses from Windows and how to scan hosts for security weaknesses from Linux; and learning the importance of securing mobile devices. Next, you will learn how to centrally apply security settings to mobile devices; how to configure Amazon Web Services to use multifactor authentication; and examine how security is applied to applications from design to use. Learn how to use file hashing to detect modifications; how to specify actions used when dealing with security incidents; and learn to view a packet capture to identify suspicious activity centrally apply security settings.

WHAT YOU WILL LEARN

  • List best practices related to it security auditing
    Use group policy to enable file system auditing
    Scan hosts for security weaknesses from windows
    Scan hosts for security weaknesses from linux
    Describe the importance of securing mobile devices
    Centrally apply security settings to mobile devices
  • Configure amazon web services to use multifactor authentication
    Recognize how security is applied to applications from design to use
    Use file hashing to detect modifications
    Specify actions used when dealing with security incidents
    View a packet capture to identify suspicious activity
    Centrally apply security settings

IN THIS COURSE

  • 1m 39s
  • 6m 13s
    After completing this video, you will be able to list best practices related to IT security auditing. FREE ACCESS
  • Locked
    3.  Enable Windows File System Auditing
    7m 23s
    In this video, you will enable file system auditing using Group Policy. FREE ACCESS
  • Locked
    4.  Conduct a Vulnerability Assessment Using Windows
    5m 3s
    Find out how to scan hosts for security weaknesses from a Windows computer. FREE ACCESS
  • Locked
    5.  Conduct a Vulnerability Assessment Using Linux
    4m 30s
    Learn how to scan hosts for security weaknesses from a Linux machine. FREE ACCESS
  • Locked
    6.  Mobile Device Access Control
    6m 58s
    After completing this video, you will be able to describe the importance of securing mobile devices. FREE ACCESS
  • Locked
    7.  Configure Mobile Device Hardening Policies
    6m 4s
    Find out how to apply security settings to mobile devices centrally. FREE ACCESS
  • Locked
    8.  Enable a Smartphone as a Virtual MFA Device
    5m 10s
    In this video, learn how to configure Amazon Web Services to use two-factor authentication. FREE ACCESS
  • Locked
    9.  Securing Applications
    8m 42s
    Upon completion of this video, you will be able to recognize how security is applied to applications from design to implementation. FREE ACCESS
  • Locked
    10.  Implement File Hashing
    2m 42s
    During this video, you will learn how to use file hashing to detect modifications. FREE ACCESS
  • Locked
    11.  Incident Response Planning
    4m 34s
    After completing this video, you will be able to specify actions to take when dealing with security incidents. FREE ACCESS
  • Locked
    12.  Examine Network Traffic for Security Incidents
    4m 29s
    In this video, you will view a packet capture to identify suspicious activity. FREE ACCESS
  • Locked
    13.  Exercise: Auditing and Incident Response
    4m 38s
    In this video, learn how to apply security settings centrally. FREE ACCESS

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE

Rating 4.5 of 44 users Rating 4.5 of 44 users (44)
Rating 4.7 of 7 users Rating 4.7 of 7 users (7)
Rating 5.0 of 3 users Rating 5.0 of 3 users (3)

PEOPLE WHO VIEWED THIS ALSO VIEWED THESE

Rating 4.6 of 1991 users Rating 4.6 of 1991 users (1991)
Rating 4.4 of 519 users Rating 4.4 of 519 users (519)
Rating 4.6 of 52 users Rating 4.6 of 52 users (52)