Intelligent Orchestration: Automating Security Incident Processing
IT Security
| Intermediate
- 14 videos | 54m 57s
- Includes Assessment
- Earns a Badge
This 14-video course helps learners discover the importance of automating the responses to security incidents. Examine how security information and event management (SIEM) and security orchestration automation and response (SOAR) are related, as well as how automation and orchestration differ. The role of playbooks and machine learning in security is also covered. Begin by taking a look at security solutions that align with business objectives, then plan how security can be implemented with DevOps. Examine the relevance of security baselines, compliance reports, and regulatory compliance. Learners can observe common security tools and techniques; explore the need for proactive security incident planning; and see how to identify security incident response processes that could be automated. Differentiate between automation and orchestration solutions in IT, and describe how SIEM allows for centralized security event monitoring. Recognize the need for automated security incident triage and response; plan automation of security triage, and recall how playbooks create workflows that enable automated security incident responses. Finally, you will discover how machine learning can be used to identify potential security incidents.
WHAT YOU WILL LEARN
-
Discover the key concepts covered in this courseIdentify security solutions that align with business objectivesPlan how security can be implemented with devopsIdentify the relevance of security baselines, compliance reports, and regulatory complianceRecall common security tools and techniquesRecognize the need for proactive security incident planningIdentify security incident response processes that could be automated
-
Differentiate between automation and orchestration solutions in itDescribe how siem allows for centralized security event monitoringRecognize the need for automated security incident triage and responsePlan the automation of security triageRecall how playbooks create a workflow that enables automated security incident responsesDescribe how machine learning can be used to identify potential security incidentsSummarize the key concepts covered in this course
IN THIS COURSE
-
1m 49s
-
2m 54sFind out how to identify security solutions that align with your business objectives. FREE ACCESS
-
4m 21sIn this video, you will learn how to implement security with DevOps. FREE ACCESS
-
7m 50sIn this video, learn how to identify the relevance of security baselines, compliance reports, and regulatory compliance. FREE ACCESS
-
7m 3sUpon completion of this video, you will be able to recall common security tools and techniques. FREE ACCESS
-
3m 18sAfter completing this video, you will be able to recognize the need for proactive security incident planning. FREE ACCESS
-
3m 45sIn this video, you will identify security incident response processes that can be automated. FREE ACCESS
-
2m 34sFind out how to differentiate between automation and orchestration solutions in IT. FREE ACCESS
-
4m 13sUpon completion of this video, you will be able to describe how SIEM allows for centralized security event monitoring. FREE ACCESS
-
3m 11sUpon completion of this video, you will be able to recognize the need for automated security incident response. FREE ACCESS
-
4m 54sIn this video, you will learn how to automate security triage. FREE ACCESS
-
4m 48sUpon completion of this video, you will be able to recall how playbooks create a workflow that enables automated security incident responses. FREE ACCESS
-
2m 57sUpon completion of this video, you will be able to describe how machine learning can be used to identify potential security incidents. FREE ACCESS
-
1m 20s
EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE
Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.
Digital badges are yours to keep, forever.YOU MIGHT ALSO LIKE
PEOPLE WHO VIEWED THIS ALSO VIEWED THESE
Course
Certified Secure Software Lifecycle Professional (CSSLP) 2019: Governance, Risk, and Compliance
Rating 4.5 of 165 users
(165)