CISSP 2024: Logging, Monitoring, & Investigations

CISSP 2024    |    Expert
  • 12 videos | 33m 18s
  • Includes Assessment
  • Earns a Badge
Rating 4.9 of 7 users Rating 4.9 of 7 users (7)
In the realm of cybersecurity, logging, monitoring, and investigations play a critical role in ensuring the integrity, confidentiality, and availability of information systems. These processes help to safeguard an organization's digital assets from potential threats. In this course, learn about log management, intrusion detection and prevention systems (IDPS), and compare security information and event management (SIEM) and security orchestration, automation, and response (SOAR). Next, explore continuous monitoring and tuning, threat intelligence and hunting concepts, and user and entity behavior analytics. Finally, examine cyber forensics collection and handling, the forensic analysis process and activities, and forensic reporting and documentation. This course helps prepare learners for the Certified Information Systems Security Professional (CISSP) exam.

WHAT YOU WILL LEARN

  • Discover the key concepts covered in this course
    Outline what log management is
    Describe intrusion detection and prevention systems (idps)
    Identify what security information and event management (siem) is
    Outline elements of security orchestration, automation, and response (soar)
    Describe continuous monitoring and tuning
  • Recognize threat intelligence and threat hunting concepts
    Outline user and entity behavior analytics
    Identify details of evidence collection and handling
    Describe the forensic analysis process and activities
    Outline forensic reporting and documentation elements and best practices
    Summarize the key concepts covered in this course

IN THIS COURSE

  • 32s
    In this video, we will discover the key concepts covered in this course. FREE ACCESS
  • 2m 6s
    After completing this video, you will be able to outline what log management is. FREE ACCESS
  • Locked
    3.  Intrusion Detection and Prevention Systems (IDPS)
    4m 26s
    Through this video, you will be able to describe intrusion detection and prevention systems (IDPS). FREE ACCESS
  • Locked
    4.  Security Information and Event Management (SIEM)
    3m 12s
    Upon completion of this video, you will be able to identify what security information and event management (SIEM) is. FREE ACCESS
  • Locked
    5.  Security Orchestration, Automation, and Response (SOAR)
    2m 33s
    In this video, we will outline elements of security orchestration, automation, and response (SOAR). FREE ACCESS
  • Locked
    6.  Continuous Monitoring and Tuning
    2m 14s
    After completing this video, you will be able to describe continuous monitoring and tuning. FREE ACCESS
  • Locked
    7.  Threat Intelligence
    4m 18s
    Through this video, you will be able to recognize threat intelligence and threat hunting concepts. FREE ACCESS
  • Locked
    8.  User and Entity Behavior Analytics
    3m 4s
    In this video, we will outline user and entity behavior analytics. FREE ACCESS
  • Locked
    9.  Cyber Forensics Collection and Handling
    5m 28s
    After completing this video, you will be able to identify details of evidence collection and handling. FREE ACCESS
  • Locked
    10.  Forensic Analysis
    2m 3s
    Through this video, you will be able to describe the forensic analysis process and activities. FREE ACCESS
  • Locked
    11.  Forensic Reporting and Documentation
    2m 49s
    Upon completion of this video, you will be able to outline forensic reporting and documentation elements and best practices. FREE ACCESS
  • Locked
    12.  Course Summary
    35s
    In this video, we will summarize the key concepts covered in this course. FREE ACCESS

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE

Rating 4.9 of 24 users Rating 4.9 of 24 users (24)
Rating 4.8 of 52 users Rating 4.8 of 52 users (52)
Rating 5.0 of 3 users Rating 5.0 of 3 users (3)