CISSP 2024: Logging, Monitoring, & Investigations
CISSP 2024
| Expert
- 12 videos | 33m 18s
- Includes Assessment
- Earns a Badge
In the realm of cybersecurity, logging, monitoring, and investigations play a critical role in ensuring the integrity, confidentiality, and availability of information systems. These processes help to safeguard an organization's digital assets from potential threats. In this course, learn about log management, intrusion detection and prevention systems (IDPS), and compare security information and event management (SIEM) and security orchestration, automation, and response (SOAR). Next, explore continuous monitoring and tuning, threat intelligence and hunting concepts, and user and entity behavior analytics. Finally, examine cyber forensics collection and handling, the forensic analysis process and activities, and forensic reporting and documentation. This course helps prepare learners for the Certified Information Systems Security Professional (CISSP) exam.
WHAT YOU WILL LEARN
-
Discover the key concepts covered in this courseOutline what log management isDescribe intrusion detection and prevention systems (idps)Identify what security information and event management (siem) isOutline elements of security orchestration, automation, and response (soar)Describe continuous monitoring and tuning
-
Recognize threat intelligence and threat hunting conceptsOutline user and entity behavior analyticsIdentify details of evidence collection and handlingDescribe the forensic analysis process and activitiesOutline forensic reporting and documentation elements and best practicesSummarize the key concepts covered in this course
IN THIS COURSE
-
32sIn this video, we will discover the key concepts covered in this course. FREE ACCESS
-
2m 6sAfter completing this video, you will be able to outline what log management is. FREE ACCESS
-
4m 26sThrough this video, you will be able to describe intrusion detection and prevention systems (IDPS). FREE ACCESS
-
3m 12sUpon completion of this video, you will be able to identify what security information and event management (SIEM) is. FREE ACCESS
-
2m 33sIn this video, we will outline elements of security orchestration, automation, and response (SOAR). FREE ACCESS
-
2m 14sAfter completing this video, you will be able to describe continuous monitoring and tuning. FREE ACCESS
-
4m 18sThrough this video, you will be able to recognize threat intelligence and threat hunting concepts. FREE ACCESS
-
3m 4sIn this video, we will outline user and entity behavior analytics. FREE ACCESS
-
5m 28sAfter completing this video, you will be able to identify details of evidence collection and handling. FREE ACCESS
-
2m 3sThrough this video, you will be able to describe the forensic analysis process and activities. FREE ACCESS
-
2m 49sUpon completion of this video, you will be able to outline forensic reporting and documentation elements and best practices. FREE ACCESS
-
35sIn this video, we will summarize the key concepts covered in this course. FREE ACCESS
EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE
Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.
Digital badges are yours to keep, forever.