Security Incident Triage
IT Security
| Intermediate
- 14 videos | 51m 44s
- Includes Assessment
- Earns a Badge
Explore the importance of security incident triage in handling incidents in a timely and automated manner, in this 14-video course, which familiarizes learners with anomalies and activities that often require triage. Key concepts covered in this course include security triage fundamentals and the strategies to implement triage; tools used in security triage; and automation techniques and common tips and rules of thumb for security triage. Next, you will explore the importance of communication and stakeholder management in security triage; examine the approaches to detecting anomalies and handling them with security triage; and learn about common protocol anomalies that require triage. Continue by exploring the different levels of monitoring for incidents in security triage while looking at network monitoring of traffic, bandwidth, and the various protocols used; learn to analyze SSH activity and security events to look for; and learn how to analyze DNS activity, HTTPS activity, and system log activity. Finally, learn how to describe security events to look for in each activity.
WHAT YOU WILL LEARN
-
Discover the key concepts covered in this courseDescribe the concepts of security triage and strategies to implement triageDescribe the tools used in security triageDescribe automation techniques in security triageDescribe common tips and rules of thumb for security triageDescribe the importance of communication and stakeholder management in security triageDescribe approaches to detecting anomalies and handling them with security triage
-
Describe common protocol anomalies that require triageDescribe monitoring for incidents in security triageAnalyze ssh activity and describe security events to look forAnalyze dns activity and describe security events to look forAnalyze https activity and describe security events to look forAnalyze system log activity and describe security events to look forSummarize the key concepts covered in this course
IN THIS COURSE
-
1m 18s
-
4m 31sAfter completing this video, you will be able to describe the concepts of security triage and strategies for implementing triage. FREE ACCESS
-
2m 59sAfter completing this video, you will be able to describe the tools used for security triage. FREE ACCESS
-
3m 20sAfter completing this video, you will be able to describe automation techniques used in security triage. FREE ACCESS
-
4m 28sUpon completion of this video, you will be able to describe common tips and rules of thumb for security triage. FREE ACCESS
-
3m 12sAfter completing this video, you will be able to describe the importance of communication and stakeholder management in security triage. FREE ACCESS
-
3m 17sAfter completing this video, you will be able to describe approaches to detecting anomalies and handling them through security triage. FREE ACCESS
-
4m 45sUpon completion of this video, you will be able to describe common protocol anomalies that require investigation. FREE ACCESS
-
3m 25sAfter completing this video, you will be able to describe monitoring for incidents during security triage. FREE ACCESS
-
4m 46sIn this video, you will learn how to analyze SSH activity and describe security events to look for. FREE ACCESS
-
5m 19sIn this video, you will analyze DNS activity and describe security events to look for. FREE ACCESS
-
5m 21sFind out how to analyze HTTPS activity and describe security events to look for. FREE ACCESS
-
4m 23sFind out how to analyze system log activity and describe security events to look for. FREE ACCESS
-
42s
EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE
Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.
Digital badges are yours to keep, forever.