CISM 2022: Security Monitoring
CISM
| Intermediate
- 15 videos | 1h 24m 2s
- Includes Assessment
- Earns a Badge
Because today's business computing environments can contain a dizzying array of device types, centralized data ingestion, and analysis, looking for anomalies is a critical part of defending against technological threats. In this course, you will begin by reviewing Microsoft Defender for Cloud security recommendations in the Microsoft Azure cloud and monitoring the performance of Windows hosts. Then you will review, search, and filter Windows Event Viewer logs, configure Windows log forwarding to a second Windows host, and monitor the performance of a Linux host. Next, you will view various Linux logs, enable Linux log forwarding using syslog-ng, review web server logs, and monitor the performance of cloud services. Finally, you will learn how to decipher threat positives and negatives, how security information and event management (SIEM) and security orchestration, automation, and response (SOAR) can detect and remediate security incidents, and how to configure the Microsoft Sentinel SIEM. This course can be used to prepare for the Certified Information Security Manager (CISM) exam.
WHAT YOU WILL LEARN
-
Discover the key concepts covered in this courseEnable and view cloud server security recommendationsMonitor windows host performanceView, search, and filter windows logsConfigure windows event viewer log forwardingMonitor linux host performanceView, search, and filter linux logsConfigure the linux syslog daemon for log forwarding
-
Analyze web server access logsMonitor performance metrics in a cloud computing environmentDescribe true positives and negatives as well as false positives and negativesRecall how a siem solution serves as a central ingestion point for security analysisRecall how a soar solution serves as a method of automating security incident remediationConfigure microsoft sentinel for data ingestionSummarize the key concepts covered in this course
IN THIS COURSE
-
1m 22sIn this video, we will discover the key concepts covered in this course. FREE ACCESS
-
5m 35sLearn how to enable and view cloud server security recommendations. FREE ACCESS
-
6m 23sIn this video, discover how to monitor Windows host performance. FREE ACCESS
-
5m 59sIn this video, find out how to view, search, and filter Windows logs. FREE ACCESS
-
6m 47sDuring this video, you will learn how to configure Windows Event Viewer log forwarding. FREE ACCESS
-
6m 57sFind out how to monitor Linux host performance. FREE ACCESS
-
5m 50sDuring this video, discover how to view, search, and filter Linux logs. FREE ACCESS
-
7m 33sIn this video, you will learn how to configure the Linux syslog daemon for log forwarding. FREE ACCESS
-
7m 27sIn this video, find out how to analyze web server access logs. FREE ACCESS
-
5m 33sDiscover how to monitor performance metrics in a cloud computing environment. FREE ACCESS
-
5m 57sAfter completing this video, you will be able to describe true positives and negatives as well as false positives and negatives. FREE ACCESS
-
4m 59sUpon completion of this video, you will be able to recall how a SIEM solution serves as a central ingestion point for security analysis. FREE ACCESS
-
6m 52sAfter completing this video, you will be able to recall how a SOAR solution serves as a method of automating security incident remediation. FREE ACCESS
-
5m 54sDiscover how to configure Microsoft Sentinel for data ingestion. FREE ACCESS
-
53sIn this video, we will summarize the key concepts covered in this course. FREE ACCESS
EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE
Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.
Digital badges are yours to keep, forever.