back

Security Operations

8 H 18 M

Just you? Training a whole team? There's an ITProTV plan that fits.

Start Training Today
Episodes
Episodes
  • Course Overview
    • Overview
  • Securing Computing Resources
    • Examining Security Baselines and Hardening
    • Examining Security for Mobile Devices
    • Examining Wireless Security
    • Examining Application Security
  • Examining Asset Management
    • Examining Asset Management
  • Examining Vulnerability Management
    • Identifying Vulnerabilities
    • Examining Vulnerability Analysis
    • Vulnerability Response, Remediation and Reporting
  • Examining Security Alert & Monitoring
    • Examining Security Monitoring and Alerting
  • Enhancing Enterprise Security
    • Examining Firewalls and Intrusion Detection Devices
    • Examining Web Filtering
    • Examining Email Security
    • Examining Endpoint Detection and Response (EDR)
    • Examining Secure Network Protocols and Services
    • Examining Operating System Security
  • Exploring Identity & Access Management
    • Examining Password Security
    • Examining Single Sign-on
    • Examining User Onboarding and Offboarding
    • Examining Identity and Access Management
    • Examining Privileged Identity Management
  • Examining Automation & Orchestration Security Operations
    • Examining Automation and Scripting Uses
  • Exploring Incident Response
    • Examining the Incident Response Process and Activities
    • Examining Digital Forensics Activities
  • Examine Investigative Data Sources
    • Examining Investigation Data Sources and Log Data

Overview

4 M

itprotv course thumbnailitprotv course thumbnailitprotv course thumbnail
  • Episode Description
  • Transcript

In this course, we will explore various security concepts, securing computing resources, asset and vulnerability management, enterprise security, identity and access management (IAM) and more.

WEBVTT >> Welcome and thanks for joining us for this overview for the Security Operations course. I'm Sophie Goodwin, I'm an edutainer and a host here at ACI Learning. I'm also certified in cybersecurity through ISC2, recently obtained that certification. With me is Wes Bryan. Mr. Wes Bryan is going to be our SME for this course. I'll be your learner advocate asking questions along >> the way. But Wes, tell me a little about yourself. Sure, yeah, I've been teaching technical courses now for, man, I keep saying better than a decade. It's actually going up closer to 15 years now. And it's been a great journey, right? I've taught security certifications, I've taught CompTIA certifications, Microsoft certifications, I've actually gone to military bases and taught military personnel, DOD security training. So definitely got a background in it. I was a former mentored learning instructor too, so I would help people as they were tackling courses. Maybe they're sitting certification. Sometimes we didn't even have people doing certifications. They just said, hey, we've got 12 people that need to know how to do this for their company and can you support it? Can you help us, right? So I look forward to jumping into this security operations course and showing you some of the specifications in the language. But also showing you some of the practical application stuff that we can see here. And I believe the background I have in training will definitely help that and we'll exude that during this course. I know I said Wes was going to be our SME for this course. I did not mean an animated pirate. He is our SME, our subject matter expert. So he'll be walking us through this course. What can we expect as we start to watch this course on security operations? What are we >> going to learn? Okay, so we're going to learn a variety of technologies and techniques that we can implement inside of our organization. We're going to learn things >> like, for instance, what does the incident response look like? What does vulnerability management look like? We're going to look at some of the benefits of security automation. How do we benefit from implementing security or excuse me, how do security operations benefit from implementing automation and scripting? We're going to look at how we secure our operating systems. We're going to look at some basic security practices. We'll talk about additional tactics as well. But it's going to be at the end of the day, how do we secure the operations? How do we implement security implementations and protection measures to make sure that our operations operate smoothly and that we have business continuity? We want to be a smooth operator, for sure. So before we jump into this course head first, let's make sure we've got all our ducks in a row. Is there anything that we as learners need to bring to the table? Any prerequisite knowledge? Yes, there is. Okay, so with this being more of a security centric training course, then what we're going to do is that we're going to assume that you have network knowledge. You need to have a strong understanding of general computing. I would say that you need to know computing from a Windows side because it is common. I would know some of the terminology around Linux and Unix, you definitely don't have to be proficient with it. You really don't have to be proficient in any of these operating systems, but you're going to have to backfill what experience maybe you don't have in those. So if you come to the table and you've already got a strong foundational knowledge for just generalized computing and networking technologies and how things like client server networks work, how TCP IP works, then you're going to do really, really good here. And even if you don't have that, I want you to understand, please come to the table. We're going to train you as well. But there is going to be some assumed knowledge that we're not going to spend a lot of time on. And I would encourage you that if we don't spend the time on that information, then that is assumed information. And I would just spend a little bit more time studying it. But I don't want you to think that if you don't have that, this course is not for you. Couldn't be farthest from the truth. We will teach anybody even if you are a career changer. Just remember, it might be a little extra work you have to do on your end. Sure. So if you're not familiar with any of that information, maybe take a look and get yourself familiar before you jump in. But if you're already an expert in networking, well, then this sounds like it's the course for you. So I think that's going to do it for >> this overview now that we've got an idea of who Wes is, who I am, and what we're going to be learning. Thank you so much for walking us through that, Wes, and thank you for joining us. We'll see you in the course.