Preemptive Troubleshooting: Concepts & Strategies
IT Security
| Intermediate
- 14 videos | 1h 24m 53s
- Includes Assessment
- Earns a Badge
Explore preemptive troubleshooting for your organization's cyber security in this 14-video course, which examines available strategies, tools, best practices, and security policies to keep your system secure. First, you will examine how preemptive troubleshooting applies to security in SecOps and how it is different from intrusion detection systems and intrusion prevention systems. This course then demonstrates several scenarios that a SOC (security operations center) can use when troubleshooting network issues and system compromise. Learn best practices, including spotting weak passwords, hardware and software vulnerabilities, and security policies and procedures to keep systems secure. You will also learn how to use password policies, auditing, and how to prevent security compromises. This course demonstrates how threat hunters can help spot threats before they occur. Learners will study the policies and tools for troubleshooting hardware. Finally, you will learn how software and hardware update policies can aid in keeping system secure, and how preemptive resolution and training can help an organization to better secure its systems.
WHAT YOU WILL LEARN
-
Discover the key concepts covered in this courseDescribe preemptive troubleshooting and how it applies to security and secopsRecognize how preemptive troubleshooting is different than intrusion detection systemsDescribe policies and procedures for keeping systems secure in preemptive troubleshootingUse tools to troubleshoot hardware and policies to prevent security compromiseUse password policies to enforce complianceUpdate software and recognize the importance of doing so
-
Update hardware and recognize the importance of doing soDescribe how indicators of compromise can help reduce exploits in an environmentIdentify how a security operations center can be a vital asset to an organizationRecognize how threat hunters can help spot threats before they occurDifferentiate between being preemptive and reactive in troubleshootingDemonstrate how training can keep an organization secureSummarize the key concepts covered in this course
IN THIS COURSE
-
1m 50s
-
6m 55sAfter completing this video, you will be able to describe preemptive troubleshooting and how it applies to security and SecOps. FREE ACCESS
-
5m 23sAfter completing this video, you will be able to recognize how preemptive troubleshooting is different than intrusion detection systems. FREE ACCESS
-
7m 18sAfter completing this video, you will be able to describe policies and procedures for keeping systems secure in order to prevent problems. FREE ACCESS
-
6m 32sIn this video, you will learn how to use tools to troubleshoot hardware and policies to prevent security compromise. FREE ACCESS
-
8m 57sLearn how to use password policies to ensure compliance. FREE ACCESS
-
6m 59sLearn how to update software and recognize the importance of doing so. FREE ACCESS
-
7m 11sLearn how to update hardware, and recognize the importance of doing so. FREE ACCESS
-
6m 35sUpon completion of this video, you will be able to describe how indicators of compromise can help reduce exploits in an environment. FREE ACCESS
-
6m 20sIn this video, you will learn how a security operations center can be a vital asset to an organization. FREE ACCESS
-
5mAfter completing this video, you will be able to recognize how threat hunters can help spot threats before they happen. FREE ACCESS
-
7m 4sIn this video, you will learn how to differentiate between being proactive and reactive in troubleshooting. FREE ACCESS
-
7m 17sIn this video, you will learn how training can keep an organization secure. FREE ACCESS
-
1m 34s
EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE
Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.
Digital badges are yours to keep, forever.