From the course: Complete Guide to Cybersecurity: A Practical Approach
Unlock this course with a free trial
Join today to access over 24,400 courses taught by industry experts.
Understanding security monitoring fundamentals
From the course: Complete Guide to Cybersecurity: A Practical Approach
Understanding security monitoring fundamentals
- [Instructor] You already know that security monitoring plays a crucial role in your organization's cybersecurity strategy. It will help you detect, investigate, and respond to potential threats and incidents in real time. So, understanding the fundamentals of security monitoring can help you build a strong foundation for your organization's security posture, right? So here, we'll discuss the essential components of security monitoring, different best practices, and key considerations of implementing an effective security monitoring strategy. So these are some essential components of security monitoring. First is security information and event management systems, right, SIEM. Basically, that's the system that, of course, is going to collect, aggregate and analyze data from different sources like firewalls and intrusion detection systems, network traffic information like NetFlow, and alerts, and EDR or endpoint detection and response, right? And talking about that, of course, you have…
Contents
-
-
-
-
-
-
-
-
-
-
-
(Locked)
Module 2: Incident response, digital forensics, and threat hunting introduction39s
-
(Locked)
Learning objectives54s
-
(Locked)
Exploring how to get started in incident response6m 6s
-
(Locked)
Understanding the incident response process5m 46s
-
(Locked)
Defining playbooks and run book automation (RBA)10m 29s
-
(Locked)
Understanding cyber threat intelligence (CTI)10m 23s
-
(Locked)
Understanding data normalization3m 1s
-
(Locked)
Deconstructing universal data formats and 5-tuple correlation1m 19s
-
(Locked)
Understanding security monitoring fundamentals6m 32s
-
(Locked)
Surveying security monitoring tools13m 33s
-
(Locked)
-
-
-
-
-
-
-
-
-
-
-
-
-
-