CISM 2020: Detecting Security Anomalies

CISM    |    Intermediate
  • 10 videos | 56m 26s
  • Includes Assessment
  • Earns a Badge
Rating 4.6 of 26 users Rating 4.6 of 26 users (26)
Information security managers must have the most efficient tools to detect potential security incidents at their disposal. In this course, you'll explore several tools that can be used to detect anomalies and learn how to take action to mitigate these anomalies. You'll learn to differentiate intrusion detection from intrusion prevention, before using Snort for network anomaly detection. You'll then examine how honeypots provide insight related to malicious user techniques. Next, you'll analyze various types of Windows logs, before working with logging in Linux. Lastly, you'll configure data loss prevention in the cloud, view compliance reports, and outline how SIEM and SOAR can be used for incident detection and response. This course is one of a collection of courses that prepares learners for the Certified Information Security Manager (CISM) certification.

WHAT YOU WILL LEARN

  • Discover the key concepts covered in this course
    Recognize how security baselines can help identify potential indicators of compromise
    Identify how ipd and ips systems differ
    Deploy snort to detect network anomalies
    Recall how honeypots and honeynets provide valuable insight related to attacker methods
  • View and filter windows logs
    Enable linux logging to a central logging host
    Identify cloud configuration security violations
    Recognize how centralized incident and log analysis and correlation are part of an isms
    Summarize the key concepts covered in this course

IN THIS COURSE

  • 1m 52s
  • 5m 21s
    After completing this video, you will be able to recognize how security baselines can help identify potential security risks. FREE ACCESS
  • Locked
    3.  Intrusion Detection and Prevention
    6m 25s
    In this video, you will identify how IPD and IPS systems differ. FREE ACCESS
  • Locked
    4.  Configuring the Snort IDS
    9m 58s
    During this video, you will learn how to deploy Snort to detect network anomalies. FREE ACCESS
  • Locked
    5.  Honeypots and Honeynets
    4m 47s
    After completing this video, you will be able to recall how honeypots and honeynets provide valuable insight related to attacker methods. FREE ACCESS
  • Locked
    6.  Analyzing Windows Logs
    8m 38s
    In this video, you will view and filter Windows Event logs. FREE ACCESS
  • Locked
    7.  Enabling Linux Log Forwarding
    6m 50s
    In this video, you will learn how to enable Linux logging to a central logging server. FREE ACCESS
  • Locked
    8.  Viewing Non-compliance Reports
    6m 30s
    In this video, you will identify security violations in cloud configurations. FREE ACCESS
  • Locked
    9.  SIEM and SOAR
    5m 2s
    Upon completion of this video, you will be able to recognize how centralized incident and log analysis and correlation are part of an Information Security Management System. FREE ACCESS
  • Locked
    10.  Course Summary
    1m 2s

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE

Rating 4.4 of 51 users Rating 4.4 of 51 users (51)
Rating 4.6 of 85 users Rating 4.6 of 85 users (85)
Rating 4.5 of 37 users Rating 4.5 of 37 users (37)

PEOPLE WHO VIEWED THIS ALSO VIEWED THESE

Rating 4.5 of 37 users Rating 4.5 of 37 users (37)
Rating 4.7 of 33 users Rating 4.7 of 33 users (33)
Rating 4.4 of 29 users Rating 4.4 of 29 users (29)