Cyber Security Audits
IT Security
| Intermediate
- 14 videos | 1h 39m 51s
- Includes Assessment
- Earns a Badge
In this 14-video course, learners will explore cybersecurity auditing concepts and the NIST Cybersecurity Framework, how they can improve infrastructure security, and how to perform cybersecurity assessments. Examine web application auditing and approaches for securing web applications. Key concepts covered here include cybersecurity auditing concepts and how they are used to improve infrastructure security; steps used in performing cybersecurity assessments; and how to examine audit review, analysis, and reporting. Next, learn how to use the Wireshark network security auditing tool; how to use the Nmap perimeter security tool; how to perform web application auditing and secure web application and websites; and how to monitor and audit Windows by using audit policies and Event Viewer. Then learn how to monitor the Linux system by reviewing system logs; learn how to use Tiger security audit and intrusion detection tool; and examine guidelines and standards for defining cybersecurity audit strategies. Finally, learn about available security audit tools and their features and benefits; and learn to use Nessus audit tool to run Nessus security system scans.
WHAT YOU WILL LEARN
-
Discover the key concepts covered in this courseDescribe cyber security auditing concepts and the nist cybersecurity framework and how they are used to improve infrastructure securityDescribe how to perform a cyber security assessmentDescribe audit review, analysis, and reportingUse the wireshark network security auditing toolUse the nmap perimeter security toolDescribe how to perform web application auditing and secure web application and web sites
-
Describe how to monitor and audit windows using audit policies and the event viewerDescribe how to monitor the linux system by reviewing system logsUse the tiger security audit and intrusion detection toolDescribe guidelines and standards for defining cyber security audit strategiesCompare available security audit tools and outline their features and benefitsUse the nessus audit tool to run a nessus security system scanSummarize the key concepts covered in this course
IN THIS COURSE
-
1m 34s
-
7m 37sUpon completion of this video, you will be able to describe cyber security auditing concepts, the NIST Cybersecurity Framework, and how they are used to improve infrastructure security. FREE ACCESS
-
6m 2sUpon completion of this video, you will be able to describe how to perform a cyber security assessment. FREE ACCESS
-
4m 23sAfter completing this video, you will be able to describe audit review, analysis, and reporting. FREE ACCESS
-
11m 22sLearn how to use the Wireshark network security auditing tool. FREE ACCESS
-
11m 50sIn this video, find out how to use the nmap tool for perimeter security. FREE ACCESS
-
8m 23sAfter completing this video, you will be able to describe how to perform web application auditing and secure web applications and websites. FREE ACCESS
-
7m 54sAfter completing this video, you will be able to describe how to monitor and audit Windows using audit policies and the Event Viewer. FREE ACCESS
-
7m 42sUpon completion of this video, you will be able to describe how to monitor the Linux system by reviewing system logs. FREE ACCESS
-
5m 59sIn this video, you will use the Tiger security audit and intrusion detection tool. FREE ACCESS
-
5m 57sAfter completing this video, you will be able to describe guidelines and standards for defining cyber security audit strategies. FREE ACCESS
-
5m 1sLearn how to compare available security audit tools, outlining their features and benefits. FREE ACCESS
-
15m 15sLearn how to use the Nessus audit tool to run a Nessus security system scan. FREE ACCESS
-
51s
EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE
Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.
Digital badges are yours to keep, forever.