Course details

Cyber Security Audits

Cyber Security Audits


Overview/Description
Expected Duration
Lesson Objectives
Course Number
Expertise Level



Overview/Description

In this 14-video course, learners will explore cybersecurity auditing concepts and the NIST Cybersecurity Framework, how they can improve infrastructure security, and how to perform cybersecurity assessments. Examine web application auditing and approaches for securing web applications. Key concepts covered here include cybersecurity auditing concepts and how they are used to improve infrastructure security; steps used in performing cybersecurity assessments; and how to examine audit review, analysis, and reporting. Next, learn how to use the Wireshark network security auditing tool; how to use the Nmap perimeter security tool; how to perform web application auditing and secure web application and websites; and how to monitor and audit Windows by using audit policies and Event Viewer. Then learn how to monitor the Linux system by reviewing system logs; learn how to use Tiger security audit and intrusion detection tool; and examine guidelines and standards for defining cybersecurity audit strategies. Finally, learn about available security audit tools and their features and benefits; and learn to use Nessus audit tool to run Nessus security system scans.



Expected Duration (hours)
1.7

Lesson Objectives

Cyber Security Audits

  • discover the key concepts covered in this course
  • describe cyber security auditing concepts and the NIST Cybersecurity Framework and how they are used to improve infrastructure security
  • describe how to perform a cyber security assessment
  • describe audit review, analysis, and reporting
  • use the Wireshark network security auditing tool
  • use the nmap perimeter security tool
  • describe how to perform web application auditing and secure web application and web sites
  • describe how to monitor and audit Windows using audit policies and the Event Viewer
  • describe how to monitor the Linux system by reviewing system logs
  • use the Tiger security audit and intrusion detection tool
  • describe guidelines and standards for defining cyber security audit strategies
  • compare available security audit tools and outline their features and benefits
  • use the Nessus audit tool to run a Nessus security system scan
  • summarize the key concepts covered in this course
  • Course Number:
    it_saseaudj_01_enus

    Expertise Level
    Intermediate