Examining Organizational Security Operations
Examining Organizational Security Operations Overview
This course covers essential security operations and management, including compliance with investigations, logging, and monitoring. Learn configuration management and foundational security concepts, along with resource protection and incident management. Skills in operating and maintaining detection and preventive measures are developed, alongside implementing patch and vulnerability management. You will also gain proficiency in recovery strategies, disaster recovery processes, and testing DR plans. The course includes business continuity planning and exercises, and managing physical security, preparing you to effectively support and enhance organizational security measures.
0h 2m
WEBVTT
Hey, thank you so much for
joining us. I'm your host,
Lauren Deal. I'll be your
learner advocate going along
as we ask Wes the question.
So welcome in, Wes. How are
you? Hey, I'm doing good.
Looking forward to getting
started in security operations.
Absolutely. In fact, we're
going to have a lot to cover.
So, Wes, before we jump into
that, tell us a little bit
about you. Oh, absolutely.
Yeah. So I've been a technical
instructor for almost 15 years
now, and I teach a variety of
industry certification exams
in skills-related courses
from CompTIA to Microsoft.
I teach cloud-based technology.
So really looking forward to
diving into some security
operations, security concepts,
and then
helping you achieve your
security goals. Ooh, I love
that. I'm following along, too,
trying to reach my security
goals. So what are we going to
be covering in security
operations? Sure. We're going
to be covering a variety of
different topics. We'll be
talking about things like patch
management, vulnerability
management, change management.
We'll be talking about things
like disaster recovery, whether
it's implementing disaster
recovery, the steps and
processes to test your disaster
recovery. We'll be talking
about things like business
continuity, planning as well.
We'll then turn our attention
to things like physical
security. And last but not
least, certainly protecting the
personnel as well, all here in
this course that you're about
to watch.
Well, speaking of personnel,
the people at home, who might
be the best audience for this
or are there any prerequisites
we need?
No, there's not really any
prerequisites. If I have to
mention any prerequisites,
we'll go with a basic
understanding of security
concepts would be beneficial
because I guess that would be
some of the assumed knowledge,
right? When we talk about
things like vulnerability
management, certainly don't
expect you to know what
vulnerability management is for
men to end. But having a
passing familiarity with what a
vulnerability could definitely
help you. So I would have a
familiarity with some of the
terms. However, keep in mind,
it's a recommendation, not a
requirement. Keep in mind,
anything that is assumed,
if you do not know, that's
okay. You can just backfill
with a little bit more study as
we continue through some of
these topics centered around
security operations.
I'm excited to get started.
And remember that Wes has a lot
of notes you can follow along
with. He'll give you some
resources if you want to dig
into some information deeper.
But I've got my pen ready and I
hope you do too. Let's jump
into the first one.
Overview
This course covers essential security operations and management, including compliance with investigations, logging, and monitoring. Learn configuration management and foundational security concepts, along with resource protection and incident management. Skills in operating and maintaining detection and preventive measures are developed, alongside implementing patch and vulnerability management. You will also gain proficiency in recovery strategies, disaster recovery processes, and testing DR plans. The course includes business continuity planning and exercises, and managing physical security, preparing you to effectively support and enhance organizational security measures.
Learning Style
On Demand
Length of course
3h 46m
16 Episodes
Here are the topics we'll cover
- Overview
- Security Operations
Learning Options
Options for this course
Train your team
Stay ahead of the curve and future-proof your business with training programs designed for you.
Channel & Reseller
Transform your experience and integrate with our unique evolving library of Audit, Cybersecurity, and Information Technology courses.
Individual learners
Learn at your own pace and get your certification training.