Environment Monitoring, Retention, and Data Logging
Cybersecurity
| Beginner
- 23 videos | 52m 16s
- Includes Assessment
- Earns a Badge
Logging is used to record events that occur within an organization's systems and networks. Oftentimes, logging information can help with the identification and isolation of any intruder or malware. In this course, explore acceptable use policies (AUP) and how they apply to employee monitoring. Discover how monitoring as a service can benefit an organization, and explore devices that can be monitored on a network including routers, switches, laptops, and wireless access points. Explore how retention policies can identify how long different types of data are maintained and discover when to implement a centralized enterprise logging service. Lastly, explore how keystroke loggers can capture and track what is typed on a keyboard and learn the importance of protecting log information. This course was originally created by Global Knowledge (GK).
WHAT YOU WILL LEARN
-
Discover the key concepts covered in this courseDiscuss acceptable use policies (aup) and how they apply to employee monitoringDiscuss whether your company monitor your personal lifeProvide an overview of monitoring as a service and recognize how it can benefit an organizationDifferentiate between the different types of monitoring including onsite, remote, system, employee, location, and usage and consumptionList devices that can be monitored on a network including routers, switches, laptops, and wireless access pointsRecognize questions to ask when developing a monitoring policyDiscuss how much monitoring is acceptableProvide an overview of physical monitoringDifferentiate between physical and it security monitoring and how they can intersectDiscuss how retention policies should identify how long different types of data are maintainedDiscuss data retention including items such as old e-mails in your corporate e-mail account
-
Provide an overview of group id's and how they allow multiple users access under a single set of identification credentialsDifferentiate between monitoring and loggingOutline benefits for both monitoring and logging practicesRecognize when to implement a centralized enterprise logging serviceProvide an overview of which types of information that can be loggedDiscuss how keystroke loggers capture and track what is typed on a keyboardRecognize the importance of having a properly implemented and supported enterprise-wide log management infrastructure in placeDescribe the importance of protecting log informationDiscuss how can log information be manipulated to aid an attackerDescribe how network time protocol (ntp) attacks can be used to alter log file timestampsRecognize how metrics measure the success of the security program
IN THIS COURSE
-
51s
-
1m 49s
-
1m 57s
-
2m 26s
-
1m 46s
-
2m 12s
-
3m 1s
-
1m 34s
-
1m 53s
-
1m 50s
-
1m 23s
-
2m 57s
-
3m 2s
-
1m 44s
-
2m 14s
-
3m 19s
-
3m 6s
-
3m 6s
-
1m 26s
-
4m 46s
-
1m 26s
-
2m 20s
-
2m 7s
EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE
Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.
Digital badges are yours to keep, forever.