Security Incident Triage

IT Security    |    Intermediate
  • 14 videos | 51m 44s
  • Includes Assessment
  • Earns a Badge
Rating 4.7 of 56 users Rating 4.7 of 56 users (56)
Explore the importance of security incident triage in handling incidents in a timely and automated manner, in this 14-video course, which familiarizes learners with anomalies and activities that often require triage. Key concepts covered in this course include security triage fundamentals and the strategies to implement triage; tools used in security triage; and automation techniques and common tips and rules of thumb for security triage. Next, you will explore the importance of communication and stakeholder management in security triage; examine the approaches to detecting anomalies and handling them with security triage; and learn about common protocol anomalies that require triage. Continue by exploring the different levels of monitoring for incidents in security triage while looking at network monitoring of traffic, bandwidth, and the various protocols used; learn to analyze SSH activity and security events to look for; and learn how to analyze DNS activity, HTTPS activity, and system log activity. Finally, learn how to describe security events to look for in each activity.

WHAT YOU WILL LEARN

  • Discover the key concepts covered in this course
    Describe the concepts of security triage and strategies to implement triage
    Describe the tools used in security triage
    Describe automation techniques in security triage
    Describe common tips and rules of thumb for security triage
    Describe the importance of communication and stakeholder management in security triage
    Describe approaches to detecting anomalies and handling them with security triage
  • Describe common protocol anomalies that require triage
    Describe monitoring for incidents in security triage
    Analyze ssh activity and describe security events to look for
    Analyze dns activity and describe security events to look for
    Analyze https activity and describe security events to look for
    Analyze system log activity and describe security events to look for
    Summarize the key concepts covered in this course

IN THIS COURSE

  • 1m 18s
  • 4m 31s
    After completing this video, you will be able to describe the concepts of security triage and strategies for implementing triage. FREE ACCESS
  • Locked
    3.  Security Triage Tools
    2m 59s
    After completing this video, you will be able to describe the tools used for security triage. FREE ACCESS
  • Locked
    4.  Security Triage Automation
    3m 20s
    After completing this video, you will be able to describe automation techniques used in security triage. FREE ACCESS
  • Locked
    5.  Security Triage Tips
    4m 28s
    Upon completion of this video, you will be able to describe common tips and rules of thumb for security triage. FREE ACCESS
  • Locked
    6.  Security Triage Stakeholders
    3m 12s
    After completing this video, you will be able to describe the importance of communication and stakeholder management in security triage. FREE ACCESS
  • Locked
    7.  Detecting Anomalies
    3m 17s
    After completing this video, you will be able to describe approaches to detecting anomalies and handling them through security triage. FREE ACCESS
  • Locked
    8.  Protocol Anomalies
    4m 45s
    Upon completion of this video, you will be able to describe common protocol anomalies that require investigation. FREE ACCESS
  • Locked
    9.  Monitoring for Incidents
    3m 25s
    After completing this video, you will be able to describe monitoring for incidents during security triage. FREE ACCESS
  • Locked
    10.  Analyzing for SSH Activity
    4m 46s
    In this video, you will learn how to analyze SSH activity and describe security events to look for. FREE ACCESS
  • Locked
    11.  Analyzing for DNS Activity
    5m 19s
    In this video, you will analyze DNS activity and describe security events to look for. FREE ACCESS
  • Locked
    12.  Analyzing for HTTPS Activity
    5m 21s
    Find out how to analyze HTTPS activity and describe security events to look for. FREE ACCESS
  • Locked
    13.  Analyzing for Log Activity
    4m 23s
    Find out how to analyze system log activity and describe security events to look for. FREE ACCESS
  • Locked
    14.  Course Summary
    42s

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE

Rating 4.6 of 25 users Rating 4.6 of 25 users (25)
Rating 5.0 of 1 users Rating 5.0 of 1 users (1)
Rating 4.7 of 27 users Rating 4.7 of 27 users (27)

PEOPLE WHO VIEWED THIS ALSO VIEWED THESE

Rating 4.8 of 75 users Rating 4.8 of 75 users (75)
Rating 4.3 of 9 users Rating 4.3 of 9 users (9)
Rating 4.4 of 28 users Rating 4.4 of 28 users (28)