CISM 2022: Security Monitoring

CISM    |    Intermediate
  • 15 videos | 1h 24m 2s
  • Includes Assessment
  • Earns a Badge
Rating 4.8 of 11 users Rating 4.8 of 11 users (11)
Because today's business computing environments can contain a dizzying array of device types, centralized data ingestion, and analysis, looking for anomalies is a critical part of defending against technological threats. In this course, you will begin by reviewing Microsoft Defender for Cloud security recommendations in the Microsoft Azure cloud and monitoring the performance of Windows hosts. Then you will review, search, and filter Windows Event Viewer logs, configure Windows log forwarding to a second Windows host, and monitor the performance of a Linux host. Next, you will view various Linux logs, enable Linux log forwarding using syslog-ng, review web server logs, and monitor the performance of cloud services. Finally, you will learn how to decipher threat positives and negatives, how security information and event management (SIEM) and security orchestration, automation, and response (SOAR) can detect and remediate security incidents, and how to configure the Microsoft Sentinel SIEM. This course can be used to prepare for the Certified Information Security Manager (CISM) exam.

WHAT YOU WILL LEARN

  • Discover the key concepts covered in this course
    Enable and view cloud server security recommendations
    Monitor windows host performance
    View, search, and filter windows logs
    Configure windows event viewer log forwarding
    Monitor linux host performance
    View, search, and filter linux logs
    Configure the linux syslog daemon for log forwarding
  • Analyze web server access logs
    Monitor performance metrics in a cloud computing environment
    Describe true positives and negatives as well as false positives and negatives
    Recall how a siem solution serves as a central ingestion point for security analysis
    Recall how a soar solution serves as a method of automating security incident remediation
    Configure microsoft sentinel for data ingestion
    Summarize the key concepts covered in this course

IN THIS COURSE

  • 1m 22s
    In this video, we will discover the key concepts covered in this course. FREE ACCESS
  • 5m 35s
    Learn how to enable and view cloud server security recommendations. FREE ACCESS
  • Locked
    3.  Monitoring the Performance of Windows Hosts
    6m 23s
    In this video, discover how to monitor Windows host performance. FREE ACCESS
  • Locked
    4.  Managing Windows Event Viewer Logs
    5m 59s
    In this video, find out how to view, search, and filter Windows logs. FREE ACCESS
  • Locked
    5.  Enabling Windows Log Forwarding
    6m 47s
    During this video, you will learn how to configure Windows Event Viewer log forwarding. FREE ACCESS
  • Locked
    6.  Monitoring the Performance of Linux Hosts
    6m 57s
    Find out how to monitor Linux host performance. FREE ACCESS
  • Locked
    7.  Managing Linux Logs
    5m 50s
    During this video, discover how to view, search, and filter Linux logs. FREE ACCESS
  • Locked
    8.  Enabling Linux Log Forwarding
    7m 33s
    In this video, you will learn how to configure the Linux syslog daemon for log forwarding. FREE ACCESS
  • Locked
    9.  Reviewing Web Server Access Logs
    7m 27s
    In this video, find out how to analyze web server access logs. FREE ACCESS
  • Locked
    10.  Monitoring the Performance of Cloud Services
    5m 33s
    Discover how to monitor performance metrics in a cloud computing environment. FREE ACCESS
  • Locked
    11.  Threat Positives and Negatives
    5m 57s
    After completing this video, you will be able to describe true positives and negatives as well as false positives and negatives. FREE ACCESS
  • Locked
    12.  Security Information and Event Management (SIEM)
    4m 59s
    Upon completion of this video, you will be able to recall how a SIEM solution serves as a central ingestion point for security analysis. FREE ACCESS
  • Locked
    13.  Security Orchestration, Automation, and Response (SOAR)
    6m 52s
    After completing this video, you will be able to recall how a SOAR solution serves as a method of automating security incident remediation. FREE ACCESS
  • Locked
    14.  Using Microsoft Sentinel As a SIEM
    5m 54s
    Discover how to configure Microsoft Sentinel for data ingestion. FREE ACCESS
  • Locked
    15.  Course Summary
    53s
    In this video, we will summarize the key concepts covered in this course. FREE ACCESS

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE

Rating 4.7 of 12 users Rating 4.7 of 12 users (12)
Rating 4.6 of 21 users Rating 4.6 of 21 users (21)
Rating 4.8 of 44 users Rating 4.8 of 44 users (44)

PEOPLE WHO VIEWED THIS ALSO VIEWED THESE

Rating 4.6 of 21 users Rating 4.6 of 21 users (21)
Rating 4.8 of 44 users Rating 4.8 of 44 users (44)
Rating 4.7 of 7 users Rating 4.7 of 7 users (7)