5910 Breckenridge Pkwy Suite B, Tampa, FL. 33610
(800) 272-0707

SkillSoft Explore Course

IT Professional Curricula     Internet and Network Technologies Solution Area     Security Solutions     Cybersecurity 101

This 12-video course explores selective auditing, which provides valuable insights to activity on a network, and incident response plans, which are proactive measures used to deal with negative events. Key concepts covered here include best practices related to IT security auditing and their benefits, including assurance that IT systems, business processes, and data are protected properly and that privileges are not being abused; and how to use Group Policy to enable file system auditing. Continue by observing how to scan hosts for security weaknesses from Windows and how to scan hosts for security weaknesses from Linux; and learning the importance of securing mobile devices. Next, you will learn how to centrally apply security settings to mobile devices; how to configure Amazon Web Services to use multifactor authentication; and examine how security is applied to applications from design to use. Learn how to use file hashing to detect modifications; how to specify actions used when dealing with security incidents; and learn to view a packet capture to identify suspicious activity centrally apply security settings.



Objectives

Cybersecurity 101: Auditing & Incident Response

  • Course Overview
  • list best practices related to IT security auditing
  • use Group Policy to enable file system auditing
  • scan hosts for security weaknesses from Windows
  • scan hosts for security weaknesses from Linux
  • describe the importance of securing mobile devices
  • centrally apply security settings to mobile devices
  • configure Amazon Web Services to use multifactor authentication
  • recognize how security is applied to applications from design to use
  • use file hashing to detect modifications
  • specify actions used when dealing with security incidents
  • view a packet capture to identify suspicious activity
  • centrally apply security settings