Preemptive Troubleshooting: Concepts & Strategies

IT Security    |    Intermediate
  • 14 videos | 1h 24m 53s
  • Includes Assessment
  • Earns a Badge
Rating 4.8 of 5 users Rating 4.8 of 5 users (5)
Explore preemptive troubleshooting for your organization's cyber security in this 14-video course, which examines available strategies, tools, best practices, and security policies to keep your system secure. First, you will examine how preemptive troubleshooting applies to security in SecOps and how it is different from intrusion detection systems and intrusion prevention systems. This course then demonstrates several scenarios that a SOC (security operations center) can use when troubleshooting network issues and system compromise. Learn best practices, including spotting weak passwords, hardware and software vulnerabilities, and security policies and procedures to keep systems secure. You will also learn how to use password policies, auditing, and how to prevent security compromises. This course demonstrates how threat hunters can help spot threats before they occur. Learners will study the policies and tools for troubleshooting hardware. Finally, you will learn how software and hardware update policies can aid in keeping system secure, and how preemptive resolution and training can help an organization to better secure its systems.

WHAT YOU WILL LEARN

  • Discover the key concepts covered in this course
    Describe preemptive troubleshooting and how it applies to security and secops
    Recognize how preemptive troubleshooting is different than intrusion detection systems
    Describe policies and procedures for keeping systems secure in preemptive troubleshooting
    Use tools to troubleshoot hardware and policies to prevent security compromise
    Use password policies to enforce compliance
    Update software and recognize the importance of doing so
  • Update hardware and recognize the importance of doing so
    Describe how indicators of compromise can help reduce exploits in an environment
    Identify how a security operations center can be a vital asset to an organization
    Recognize how threat hunters can help spot threats before they occur
    Differentiate between being preemptive and reactive in troubleshooting
    Demonstrate how training can keep an organization secure
    Summarize the key concepts covered in this course

IN THIS COURSE

  • 1m 50s
  • 6m 55s
    After completing this video, you will be able to describe preemptive troubleshooting and how it applies to security and SecOps. FREE ACCESS
  • Locked
    3.  What Makes Preemptive Troubleshooting Different?
    5m 23s
    After completing this video, you will be able to recognize how preemptive troubleshooting is different than intrusion detection systems. FREE ACCESS
  • Locked
    4.  Preemptive Troubleshooting Policies and Procedures
    7m 18s
    After completing this video, you will be able to describe policies and procedures for keeping systems secure in order to prevent problems. FREE ACCESS
  • Locked
    5.  Preemptive Troubleshooting Tools at Work
    6m 32s
    In this video, you will learn how to use tools to troubleshoot hardware and policies to prevent security compromise. FREE ACCESS
  • Locked
    6.  Identifying Weak Passwords
    8m 57s
    Learn how to use password policies to ensure compliance. FREE ACCESS
  • Locked
    7.  Using Software Update Policies
    6m 59s
    Learn how to update software and recognize the importance of doing so. FREE ACCESS
  • Locked
    8.  Hardware Updates and Policies
    7m 11s
    Learn how to update hardware, and recognize the importance of doing so. FREE ACCESS
  • Locked
    9.  Indicators of Compromise
    6m 35s
    Upon completion of this video, you will be able to describe how indicators of compromise can help reduce exploits in an environment. FREE ACCESS
  • Locked
    10.  Security Operations Center
    6m 20s
    In this video, you will learn how a security operations center can be a vital asset to an organization. FREE ACCESS
  • Locked
    11.  Threat Hunters
    5m
    After completing this video, you will be able to recognize how threat hunters can help spot threats before they happen. FREE ACCESS
  • Locked
    12.  Preemptive vs. Reactive
    7m 4s
    In this video, you will learn how to differentiate between being proactive and reactive in troubleshooting. FREE ACCESS
  • Locked
    13.  Preemptive Scenarios
    7m 17s
    In this video, you will learn how training can keep an organization secure. FREE ACCESS
  • Locked
    14.  Course Summary
    1m 34s

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE

Rating 4.4 of 5 users Rating 4.4 of 5 users (5)
Rating 4.7 of 51 users Rating 4.7 of 51 users (51)
Rating 4.4 of 231 users Rating 4.4 of 231 users (231)

PEOPLE WHO VIEWED THIS ALSO VIEWED THESE

Rating 4.6 of 66 users Rating 4.6 of 66 users (66)
Rating 4.6 of 181 users Rating 4.6 of 181 users (181)
Rating 4.4 of 27 users Rating 4.4 of 27 users (27)