Genre: eLearning | MP4 | Video: h264, 1280×720 | Audio: AAC, 44.1 KHz
Language: English | Size: 1.33 GB | Duration: 33 lectures • 3h 39m
Operations take place after the network is developed and implemented, learn how to maintain the security of our networks
What you’ll learn
Administrative management responsibilities
Operations department responsibilities
Configuration management
Secure resource provisioning
Network and resource availability
Preventative measures and Physical security
Patch management
Recovery strategies
Business continuity planning and exercises
Requirements
A PC or Mac
Internet Access
Description
Welcome to this course. Networks and computing environments are evolving entities; just because they are secure one week does not mean they are still secure three weeks later. Many companies pay security consultants to come in and advise them on how to improve their infrastructure, policies, and procedures. A company can then spend thousands or even hundreds of thousands of dollars to implement the consultant’s suggestions and install properly configured firewalls, intrusion detection systems (IDSs), antivirus software, and patch management systems. However, if the IDS and antivirus software do not continually have updated signatures, if the systems are not continually patched and monitored, if firewalls and devices are not tested for vulnerabilities, or if new software is added to the network and not added to the operations plan, then the company can easily slip back into an insecure and dangerous place. This can happen if the company does not keep its operational security tasks up-to-date. Operations take place after the network is developed and implemented. This includes the continual maintenance of an environment and the activities that should take place on a day-to-day or week-to-week basis. These activities are routine in nature and enable the network and individual computer systems to continue running correctly and securely. Security operations also involves the detection, containment, eradication, and recovery that is required to ensure the continuity of business operations. It may also require addressing liability and compliance issues. In short, security operations encompasses all the activities required to ensure the security of information systems.
In this course, you’ll learn
Operations department responsibilities
Administrative management responsibilities
Assurance levels and Configuration management
Secure resource provisioning
Network and resource availability
Preventative measures and Physical security
Patch management and Recovery strategies
Disaster recovery, Business continuity planning and exercises
Liability and Investigations
Personal safety concerns
Who this course is for
Cybersecurity professionals
Software Developers
Programmers
Anyone interested in Cyber Security
Password/解压密码www.tbtos.com
转载请注明:0daytown » The Ultimate Security Operations Training Course: All In One