Auditing & Incident Response
Cybersecurity
| Intermediate
- 13 videos | 1h 8m 5s
- Includes Assessment
- Earns a Badge
This 12-video course explores selective auditing, which provides valuable insights to activity on a network, and incident response plans, which are proactive measures used to deal with negative events. Key concepts covered here include best practices related to IT security auditing and their benefits, including assurance that IT systems, business processes, and data are protected properly and that privileges are not being abused; and how to use Group Policy to enable file system auditing. Continue by observing how to scan hosts for security weaknesses from Windows and how to scan hosts for security weaknesses from Linux; and learning the importance of securing mobile devices. Next, you will learn how to centrally apply security settings to mobile devices; how to configure Amazon Web Services to use multifactor authentication; and examine how security is applied to applications from design to use. Learn how to use file hashing to detect modifications; how to specify actions used when dealing with security incidents; and learn to view a packet capture to identify suspicious activity centrally apply security settings.
WHAT YOU WILL LEARN
-
List best practices related to it security auditingUse group policy to enable file system auditingScan hosts for security weaknesses from windowsScan hosts for security weaknesses from linuxDescribe the importance of securing mobile devicesCentrally apply security settings to mobile devices
-
Configure amazon web services to use multifactor authenticationRecognize how security is applied to applications from design to useUse file hashing to detect modificationsSpecify actions used when dealing with security incidentsView a packet capture to identify suspicious activityCentrally apply security settings
IN THIS COURSE
-
1m 39s
-
6m 13sAfter completing this video, you will be able to list best practices related to IT security auditing. FREE ACCESS
-
7m 23sIn this video, you will enable file system auditing using Group Policy. FREE ACCESS
-
5m 3sFind out how to scan hosts for security weaknesses from a Windows computer. FREE ACCESS
-
4m 30sLearn how to scan hosts for security weaknesses from a Linux machine. FREE ACCESS
-
6m 58sAfter completing this video, you will be able to describe the importance of securing mobile devices. FREE ACCESS
-
6m 4sFind out how to apply security settings to mobile devices centrally. FREE ACCESS
-
5m 10sIn this video, learn how to configure Amazon Web Services to use two-factor authentication. FREE ACCESS
-
8m 42sUpon completion of this video, you will be able to recognize how security is applied to applications from design to implementation. FREE ACCESS
-
2m 42sDuring this video, you will learn how to use file hashing to detect modifications. FREE ACCESS
-
4m 34sAfter completing this video, you will be able to specify actions to take when dealing with security incidents. FREE ACCESS
-
4m 29sIn this video, you will view a packet capture to identify suspicious activity. FREE ACCESS
-
4m 38sIn this video, learn how to apply security settings centrally. FREE ACCESS
EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE
Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.
Digital badges are yours to keep, forever.