最新消息:请大家多多支持

The Ultimate Security Operations Training Course: All In One

其他教程 dsgsd 138浏览 0评论

Genre: eLearning | MP4 | Video: h264, 1280×720 | Audio: AAC, 44.1 KHz
Language: English | Size: 1.33 GB | Duration: 33 lectures • 3h 39m

Operations take place after the network is developed and implemented, learn how to maintain the security of our networks

What you’ll learn
Administrative management responsibilities
Operations department responsibilities
Configuration management
Secure resource provisioning
Network and resource availability
Preventative measures and Physical security
Patch management
Recovery strategies
Business continuity planning and exercises

Requirements
A PC or Mac
Internet Access
Description
Welcome to this course. Networks and computing environments are evolving entities; just because they are secure one week does not mean they are still secure three weeks later. Many companies pay security consultants to come in and advise them on how to improve their infrastructure, policies, and procedures. A company can then spend thousands or even hundreds of thousands of dollars to implement the consultant’s suggestions and install properly configured firewalls, intrusion detection systems (IDSs), antivirus software, and patch management systems. However, if the IDS and antivirus software do not continually have updated signatures, if the systems are not continually patched and monitored, if firewalls and devices are not tested for vulnerabilities, or if new software is added to the network and not added to the operations plan, then the company can easily slip back into an insecure and dangerous place. This can happen if the company does not keep its operational security tasks up-to-date. Operations take place after the network is developed and implemented. This includes the continual maintenance of an environment and the activities that should take place on a day-to-day or week-to-week basis. These activities are routine in nature and enable the network and individual computer systems to continue running correctly and securely. Security operations also involves the detection, containment, eradication, and recovery that is required to ensure the continuity of business operations. It may also require addressing liability and compliance issues. In short, security operations encompasses all the activities required to ensure the security of information systems.

In this course, you’ll learn

Operations department responsibilities

Administrative management responsibilities

Assurance levels and Configuration management

Secure resource provisioning

Network and resource availability

Preventative measures and Physical security

Patch management and Recovery strategies

Disaster recovery, Business continuity planning and exercises

Liability and Investigations

Personal safety concerns

Who this course is for
Cybersecurity professionals
Software Developers
Programmers
Anyone interested in Cyber Security


Password/解压密码www.tbtos.com

资源下载此资源仅限VIP下载,请先

转载请注明:0daytown » The Ultimate Security Operations Training Course: All In One

您必须 登录 才能发表评论!