Price: 5.00 USD | Size: 6.12 GB | Duration :3.34 Hours | 58 Video seasons | ★★★★★ 4.5
BRAND : Expert TRAINING | ENGLISH | INSTANT DOWNLOAD | Bonus PDF Guides
Secure Operations and Protections Online Course
Overview:
Understanding how to keep data operations secure and protect data is a critical part of any organizations day-to-day business. With more than 3 hours of video training, Secure Operations and Protections LiveLessons dives into the methodologies behind how organizations and secure operation centers observe, collect, and secure data. This course provides the learner with an understanding of basic operations and architectures that a Security Operations Center would encounter by examining standard software development life cycles and change control processes.
Topics include:
Security Solutions for Infrastructure Management
Software Assurance Best Practices
Change Control
Communications Process
Response Coordination Process
Data Criticality Process
Table of contents
Introduction
Secure Operations and Protections LiveLessons: Introduction
Lesson 1: Security Solutions for Infrastructure Management
Learning objectives
1.1 Cloud vs. On-premises - Part 1
1.2 Cloud vs. On-premises - Part 2
1.3 Asset Management
1.4 Segmentation
1.5 Network Architecture
1.6 Change Management
1.7 Containerization
1.8 Identity and Access Management
1.9 Cloud Access Security Broker (CASB)
1.10 Honeypots and Breach Detection
1.11 Encryption and Certificate Management
Lesson 2: Software Assurance Best Practices
Learning objectives
2.1 SDLC Platforms
2.2 DevSecOps
2.3 Software Assessment Methods
2.4 User Acceptance Training and Stress Test
2.5 Security Regression Training
2.6 Code Review
2.7 Secure Coding Best Practices
2.8 Input Validation
2.9 Output Encoding
2.10 Session Management
2.11 Authentication
2.12 Data Protection
2.13 Paramaterized Queries
Lesson 3: Change Control
Learning objectives
3.1 Change Control
3.2 Allow List
3.3 Blocklist
3.4 Firewall
3.5 Intrusion Prevention System (IPS) Rules
3.6 Data Loss Prevention (DLP)
3.7 Endpoint Detection and Response (EDR)
3.8 Network Access Control (NAC)
3.9 Sinkholing
3.10 Malware Signature Rule Writing
3.11 Sandboxing
3.12 Port Security
Lesson 4: Communications Process
Learning objectives
4.1 What is a Cyber Incident
4.2 Communication Plan
4.3 Trusted Parties
4.4 Regulatory and Legislative Requirements
4.5 Preventing Inadvertent Release of Information
Lesson 5: Response Coordination Process
Learning objectives
5.1 Legal
5.2 Human Resources
5.3 Public Relations
5.4 Senior Leadership
5.5 Regulatory Bodies
Lesson 6: Data Criticality Process
Learning objectives
6.1 Personal Identifiable Information (PII)
6.2 Personal Health Information (PHI)
6.3 Sensitive Personal Information (SPI) and High Value Assets
6.4 Intellectual Property
Summary
Secure Operations and Protections LiveLessons: Summary
Related to:
operations security course
security operations course online
online security courses with certificates
web application security course syllabus
security analysis training courses
soc analyst course online
course in it security
security management and administration
Comments
Post a Comment