Monitoring & Securing System Configuration

IT Security    |    Intermediate
  • 14 videos | 1h 16m 10s
  • Includes Assessment
  • Earns a Badge
Rating 4.0 of 9 users Rating 4.0 of 9 users (9)
In this 14-video course, you will learn how to drive system configuration monitoring by using tools to keep systems secure and the importance of monitoring system configuration within an organization for incident response. Key concepts covered here include the configuration management (CM) process and how it can influence securing system configuration for incident response; tools and software to monitor systems and their advantages for incident response; and continuous monitoring in risk management, including the three-tier approach. Next, learn the process of minor, major, and unknown configuration changes; learn the importance of securing CM processes in the software development lifecycle (SDLC) for preventing security impacts; and observe methods for identifying common high probability items, such as identifying default or weak credentials. Continue by learning to implement a secure system CM program; and how to assess the monitoring process and perform security configuration evaluations. Finally, observe methods of monitoring releases and deliveries throughout SDLC; learn security controls for monitoring system configuration in a cyber framework; and learn how monitoring system configuration is important in today's enterprise SDLC.

WHAT YOU WILL LEARN

  • Discover the key concepts covered in this course
    Describe the configuration management process and how it can influence securing system configuration for incident response
    Describe tools and software available to monitor systems and their advantages for incident response
    Describe continuous monitoring in risk management, including the three-tier approach and how it relates to monitoring system configuration
    Recognize the process of minor, major, and unknown configuration changes, including what it means to an organization in terms of incident response and how they are prioritized in an incident strategy
    Recognize the importance of securing the cm process in the sdlc for preventing security impacts
    Recognize methods for identifying common high probability items, such as identifying default or weak credentials
  • Describe the process of implementing a secure system configuration monitoring program
    Assess the monitoring process and perform a security configuration evaluation
    Recognize methods of monitoring releases and deliveries throughout the software development lifecycle
    Describe security controls for monitoring system configuration in a cyber framework
    Recognize challenges organizations face today in monitoring system configuration and how they can be overcome
    Recognize how monitoring system configuration is important in today's enterprise sdlc
    Summarize the key concepts covered in this course

IN THIS COURSE

  • 1m 47s
  • 7m 39s
    After completing this video, you will be able to describe the configuration management process and how it can influence securing system configuration for incident response. FREE ACCESS
  • Locked
    3.  Tools for Monitoring System Configuration
    4m 58s
    Upon completion of this video, you will be able to describe tools and software available to monitor systems and their advantages for incident response. FREE ACCESS
  • Locked
    4.  Continuous Monitoring in System Configuration
    4m 58s
    Upon completion of this video, you will be able to describe continuous monitoring in risk management, including the three-tier approach and how it relates to monitoring system configuration. FREE ACCESS
  • Locked
    5.  Monitoring Change Management by Priority
    5m 39s
    Upon completion of this video, you will be able to recognize the process of minor, major, and unknown configuration changes, including what it means to an organization in terms of incident response and how they are prioritized in an incident response strategy. FREE ACCESS
  • Locked
    6.  CM and Securing System Configuration
    3m 37s
    After completing this video, you will be able to recognize the importance of securing the CM process in the SDLC for preventing security impacts. FREE ACCESS
  • Locked
    7.  Identifying Red Flags when Monitoring Systems
    6m 34s
    After completing this video, you will be able to recognize methods for identifying common high probability items, such as identifying default or weak credentials. FREE ACCESS
  • Locked
    8.  Implementing a Monitoring Program
    5m 42s
    After completing this video, you will be able to describe the process of implementing a system configuration monitoring program that is secure. FREE ACCESS
  • Locked
    9.  Assessing the Monitoring of Configuration
    3m 7s
    In this video, find out how to assess the monitoring process and perform a security configuration evaluation. FREE ACCESS
  • Locked
    10.  Securing System Releases and Deliveries
    10m 4s
    After completing this video, you will be able to recognize methods of monitoring releases and deliveries throughout the software development lifecycle. FREE ACCESS
  • Locked
    11.  Security Controls for Monitoring Configurations
    5m 56s
    After completing this video, you will be able to describe security controls for monitoring system configuration in a cyber framework. FREE ACCESS
  • Locked
    12.  Monitoring System Configuration Challenges
    8m 58s
    After completing this video, you will be able to recognize challenges organizations face today in monitoring system configuration and how to overcome them. FREE ACCESS
  • Locked
    13.  Importance of Monitoring System Configuration
    5m 49s
    After completing this video, you will be able to recognize the importance of monitoring system configuration in today's enterprise SDLC. FREE ACCESS
  • Locked
    14.  Course Summary
    1m 22s

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE

Rating 4.3 of 6 users Rating 4.3 of 6 users (6)
Rating 4.5 of 23 users Rating 4.5 of 23 users (23)
Rating 4.7 of 27 users Rating 4.7 of 27 users (27)

PEOPLE WHO VIEWED THIS ALSO VIEWED THESE

Rating 4.8 of 5 users Rating 4.8 of 5 users (5)
Rating 4.6 of 66 users Rating 4.6 of 66 users (66)
Rating 4.6 of 181 users Rating 4.6 of 181 users (181)