CISA 2022: Continuous Monitoring
CISA
| Expert
- 11 videos | 1h 6m 52s
- Includes Assessment
- Earns a Badge
Enterprise systems have continuous monitoring needs, of both business processes and supporting IT solutions. Information systems (IS) auditing can identify where improvements can be made. In this course, you will explore continuous monitoring, beginning with an overview of continuous monitoring, business processes, and sampling types. Then you will discover how to filter Windows logs and forward Linux logs. Next, you will focus on packet capturing placement and analysis. Finally, you will dig into security information and event management (SIEM), intrusion detection systems (IDSs), and intrusion prevention systems (IPSs). This course helps prepare learners for the ISACA certification exam, Certified Information Systems Auditor (CISA).
WHAT YOU WILL LEARN
-
Discover the key concepts covered in this courseDescribe how monitoring is an important aspect of the information systems (is) auditing processOutline the importance of monitoring business processes for continuous process improvementDescribe how sampling types like attribute, variable, statistical, and discovery sampling play a role in the audit processFilter windows logs to show only relevant log entriesSend windows log events to a centralized logging host
-
Plan optimal settings for packet capturing placement and configurationProvide an overview of how siem systems provide centralized security event monitoring and managementOutline how an ids can identify suspicious host and network activityDescribe the purpose of an ips and compare and contrast it with an idsSummarize the key concepts covered in this course
IN THIS COURSE
-
56sIn this video, we will discover the key concepts covered in this course. FREE ACCESS
-
7m 45sAfter completing this video, you will be able to describe how monitoring is an important aspect of the information systems (IS) auditing process. FREE ACCESS
-
5m 2sUpon completion of this video, you will be able to outline the importance of monitoring business processes for continuous process improvement. FREE ACCESS
-
5m 31sAfter completing this video, you will be able to describe how sampling types like attribute, variable, statistical, and discovery sampling play a role in the audit process. FREE ACCESS
-
10m 11sIn this video, find out how to filter Windows logs to show only relevant log entries. FREE ACCESS
-
12m 5sDuring this video, you will learn how to send Windows log events to a centralized logging host. FREE ACCESS
-
7m 32sDiscover how to plan optimal settings for packet capturing placement and configuration. FREE ACCESS
-
6m 13sUpon completion of this video, you will be able to provide an overview of how SIEM systems provide centralized security event monitoring and management. FREE ACCESS
-
5m 10sAfter completing this video, you will be able to outline how an IDS can identify suspicious host and network activity. FREE ACCESS
-
5m 37sUpon completion of this video, you will be able to describe the purpose of an IPS and compare and contrast it with an IDS. FREE ACCESS
-
50sIn this video, we will summarize the key concepts covered in this course. FREE ACCESS
EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE
Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.
Digital badges are yours to keep, forever.