Security Operations
8 H 18 M
Just you? Training a whole team? There's an ITProTV plan that fits.
Start Training TodayEpisodes
Episodes
- Course Overview
- Overview
- Securing Computing Resources
- Examining Security Baselines and Hardening
- Examining Security for Mobile Devices
- Examining Wireless Security
- Examining Application Security
- Examining Asset Management
- Examining Asset Management
- Examining Vulnerability Management
- Identifying Vulnerabilities
- Examining Vulnerability Analysis
- Vulnerability Response, Remediation and Reporting
- Examining Security Alert & Monitoring
- Examining Security Monitoring and Alerting
- Enhancing Enterprise Security
- Examining Firewalls and Intrusion Detection Devices
- Examining Web Filtering
- Examining Email Security
- Examining Endpoint Detection and Response (EDR)
- Examining Secure Network Protocols and Services
- Examining Operating System Security
- Exploring Identity & Access Management
- Examining Password Security
- Examining Single Sign-on
- Examining User Onboarding and Offboarding
- Examining Identity and Access Management
- Examining Privileged Identity Management
- Examining Automation & Orchestration Security Operations
- Examining Automation and Scripting Uses
- Exploring Incident Response
- Examining the Incident Response Process and Activities
- Examining Digital Forensics Activities
- Examine Investigative Data Sources
- Examining Investigation Data Sources and Log Data
Overview
4 M



- Episode Description
- Transcript
In this course, we will explore various security concepts, securing computing resources, asset and vulnerability management, enterprise security, identity and access management (IAM) and more.