Examining Organizational Security Operations

Examining Organizational Security Operations Overview
This course covers essential security operations and management, including compliance with investigations, logging, and monitoring. Learn configuration management and foundational security concepts, along with resource protection and incident management. Skills in operating and maintaining detection and preventive measures are developed, alongside implementing patch and vulnerability management. You will also gain proficiency in recovery strategies, disaster recovery processes, and testing DR plans. The course includes business continuity planning and exercises, and managing physical security, preparing you to effectively support and enhance organizational security measures.
Clock icon0h 2m
WEBVTT Hey, thank you so much for joining us. I'm your host, Lauren Deal. I'll be your learner advocate going along as we ask Wes the question. So welcome in, Wes. How are you? Hey, I'm doing good. Looking forward to getting started in security operations. Absolutely. In fact, we're going to have a lot to cover. So, Wes, before we jump into that, tell us a little bit about you. Oh, absolutely. Yeah. So I've been a technical instructor for almost 15 years now, and I teach a variety of industry certification exams in skills-related courses from CompTIA to Microsoft. I teach cloud-based technology. So really looking forward to diving into some security operations, security concepts, and then helping you achieve your security goals. Ooh, I love that. I'm following along, too, trying to reach my security goals. So what are we going to be covering in security operations? Sure. We're going to be covering a variety of different topics. We'll be talking about things like patch management, vulnerability management, change management. We'll be talking about things like disaster recovery, whether it's implementing disaster recovery, the steps and processes to test your disaster recovery. We'll be talking about things like business continuity, planning as well. We'll then turn our attention to things like physical security. And last but not least, certainly protecting the personnel as well, all here in this course that you're about to watch. Well, speaking of personnel, the people at home, who might be the best audience for this or are there any prerequisites we need? No, there's not really any prerequisites. If I have to mention any prerequisites, we'll go with a basic understanding of security concepts would be beneficial because I guess that would be some of the assumed knowledge, right? When we talk about things like vulnerability management, certainly don't expect you to know what vulnerability management is for men to end. But having a passing familiarity with what a vulnerability could definitely help you. So I would have a familiarity with some of the terms. However, keep in mind, it's a recommendation, not a requirement. Keep in mind, anything that is assumed, if you do not know, that's okay. You can just backfill with a little bit more study as we continue through some of these topics centered around security operations. I'm excited to get started. And remember that Wes has a lot of notes you can follow along with. He'll give you some resources if you want to dig into some information deeper. But I've got my pen ready and I hope you do too. Let's jump into the first one.

Overview

This course covers essential security operations and management, including compliance with investigations, logging, and monitoring. Learn configuration management and foundational security concepts, along with resource protection and incident management. Skills in operating and maintaining detection and preventive measures are developed, alongside implementing patch and vulnerability management. You will also gain proficiency in recovery strategies, disaster recovery processes, and testing DR plans. The course includes business continuity planning and exercises, and managing physical security, preparing you to effectively support and enhance organizational security measures.

Learning Style

On Demand

Length of course

3h 46m
16 Episodes

Here are the topics we'll cover

  • Overview
  • Security Operations
Learning Options

Options for this course

Train your team
Stay ahead of the curve and future-proof your business with training programs designed for you.
Channel & Reseller
Transform your experience and integrate with our unique evolving library of Audit, Cybersecurity, and Information Technology courses.
Individual learners
Learn at your own pace and get your certification training.