After this course, the auditor should be able to identify key cybersecurity processes and controls, be familiar with a SOC and its operation and understand threat intelligence, threat actors and APTs. You’ll learn more about different attack vectors and how to mitigate them.
Security Operations Center (SOC) Definitions and ConceptsDuration: 12:44
Get a closer look at the Security Operations Center (SOC), including threat intelligence and IoC (Indicators of Compromise).
Management of Threats and VulnerabilitiesDuration: 14:23
In this video, you'll look at threat assessment, vulnerability management, penetration testing and Red Team exercises.
Identity and Access ManagementDuration: 14:33
Explore IAAA: identification, authentication, authorization and accountability, plus privilege management.
Configuration Management and Asset ManagementDuration: 10:03
In this video, you'll get a closer look at asset inventory, configuration management and baseline configurations.
Managing ChangeDuration: 5:49
Learn the importance of managing change with this video on change management, change control and emergency changes.
Patch ManagementDuration: 7:08
Look at the details of managing patching and vulnerabilities, including zero-day.
Considerations for Network SecurityDuration: 14:45
Explore Network Access Control, traffic analysis, DLP, egress monitoring DNS and TLS.
Building and Deploying a Secure Authorization ProcessDuration: 7:37
In this video, take a look at system hardening, platform hardening, baseline configuration standards and credentials and privileges.
Managing IncidentsDuration: 15:45
Look at the details of managing incidents: Incident identification, response and management and digital forensics.
Protection for User EndpointsDuration: 4:27
Protect user endpoints with this information on malware defense and technical endpoint controls.
Security in ApplicationsDuration: 10:03
In this video, you'll look at application security details: SDLS, DevOps/Agile, secure coding and more.
Dig into the details of backup/recovery/resumption.
Explore compliance testing, continuous monitoring and continuous auditing.
In this video on cryptography, you'll look at encryption and hashing, DAR, DIT/DIM, key exchange and more.