Course details

Cybersecurity 101: Auditing & Incident Response

Cybersecurity 101: Auditing & Incident Response


Overview/Description
Expected Duration
Lesson Objectives
Course Number
Expertise Level



Overview/Description

This 12-video course explores selective auditing, which provides valuable insights to activity on a network, and incident response plans, which are proactive measures used to deal with negative events. Key concepts covered here include best practices related to IT security auditing and their benefits, including assurance that IT systems, business processes, and data are protected properly and that privileges are not being abused; and how to use Group Policy to enable file system auditing. Continue by observing how to scan hosts for security weaknesses from Windows and how to scan hosts for security weaknesses from Linux; and learning the importance of securing mobile devices. Next, you will learn how to centrally apply security settings to mobile devices; how to configure Amazon Web Services to use multifactor authentication; and examine how security is applied to applications from design to use. Learn how to use file hashing to detect modifications; how to specify actions used when dealing with security incidents; and learn to view a packet capture to identify suspicious activity centrally apply security settings.



Expected Duration (hours)
1.1

Lesson Objectives

Cybersecurity 101: Auditing & Incident Response

  • Course Overview
  • list best practices related to IT security auditing
  • use Group Policy to enable file system auditing
  • scan hosts for security weaknesses from Windows
  • scan hosts for security weaknesses from Linux
  • describe the importance of securing mobile devices
  • centrally apply security settings to mobile devices
  • configure Amazon Web Services to use multifactor authentication
  • recognize how security is applied to applications from design to use
  • use file hashing to detect modifications
  • specify actions used when dealing with security incidents
  • view a packet capture to identify suspicious activity
  • centrally apply security settings
  • Course Number:
    it_spcs101dj_02_enus

    Expertise Level
    Intermediate