Security Operations

Security Operations Overview
In this course, we will explore various security concepts, securing computing resources, asset and vulnerability management, enterprise security, identity and access management (IAM) and more.
Clock icon0h 4m
WEBVTT Welcome and thanks for joining us for this overview for the Security Operations course. I'm Sophie Goodwin, I'm an edutainer and a host here at ACI Learning. I'm also certified in cybersecurity through ISC2, recently obtained that certification. With me is Wes Bryan. Mr. Wes Bryan is going to be our SME for this course. I'll be your learner advocate asking questions along the way. But Wes, tell me a little about yourself. Sure, yeah, I've been teaching technical courses now for, man, I keep saying better than a decade. It's actually going up closer to 15 years now. And it's been a great journey, right? I've taught security certifications, I've taught CompTIA certifications, Microsoft certifications, I've actually gone to military bases and taught military personnel, DOD security training. So definitely got a background in it. I was a former mentored learning instructor too, so I would help people as they were tackling courses. Maybe they're sitting certification. Sometimes we didn't even have people doing certifications. They just said, hey, we've got 12 people that need to know how to do this for their company and can you support it? Can you help us, right? So I look forward to jumping into this security operations course and showing you some of the specifications in the language. But also showing you some of the practical application stuff that we can see here. And I believe the background I have in training will definitely help that and we'll exude that during this course. I know I said Wes was going to be our SME for this course. I did not mean an animated pirate. He is our SME, our subject matter expert. So he'll be walking us through this course. What can we expect as we start to watch this course on security operations? What are we going to learn? Okay, so we're going to learn a variety of technologies and techniques that we can implement inside of our organization. We're going to learn things like, for instance, what does the incident response look like? What does vulnerability management look like? We're going to look at some of the benefits of security automation. How do we benefit from implementing security or excuse me, how do security operations benefit from implementing automation and scripting? We're going to look at how we secure our operating systems. We're going to look at some basic security practices. We'll talk about additional tactics as well. But it's going to be at the end of the day, how do we secure the operations? How do we implement security implementations and protection measures to make sure that our operations operate smoothly and that we have business continuity? We want to be a smooth operator, for sure. So before we jump into this course head first, let's make sure we've got all our ducks in a row. Is there anything that we as learners need to bring to the table? Any prerequisite knowledge? Yes, there is. Okay, so with this being more of a security centric training course, then what we're going to do is that we're going to assume that you have network knowledge. You need to have a strong understanding of general computing. I would say that you need to know computing from a Windows side because it is common. I would know some of the terminology around Linux and Unix, you definitely don't have to be proficient with it. You really don't have to be proficient in any of these operating systems, but you're going to have to backfill what experience maybe you don't have in those. So if you come to the table and you've already got a strong foundational knowledge for just generalized computing and networking technologies and how things like client server networks work, how TCP IP works, then you're going to do really, really good here. And even if you don't have that, I want you to understand, please come to the table. We're going to train you as well. But there is going to be some assumed knowledge that we're not going to spend a lot of time on. And I would encourage you that if we don't spend the time on that information, then that is assumed information. And I would just spend a little bit more time studying it. But I don't want you to think that if you don't have that, this course is not for you. Couldn't be farthest from the truth. We will teach anybody even if you are a career changer. Just remember, it might be a little extra work you have to do on your end. Sure. So if you're not familiar with any of that information, maybe take a look and get yourself familiar before you jump in. But if you're already an expert in networking, well, then this sounds like it's the course for you. So I think that's going to do it for this overview now that we've got an idea of who Wes is, who I am, and what we're going to be learning. Thank you so much for walking us through that, Wes, and thank you for joining us. We'll see you in the course.

Overview

In this course, we will explore various security concepts, securing computing resources, asset and vulnerability management, enterprise security, identity and access management (IAM) and more.

Learning Style

On Demand

Length of course

8h 18m
25 Episodes

Here are the topics we'll cover

  • Course Overview
  • Securing Computing Resources
  • Examining Asset Management
  • Examining Vulnerability Management
  • Examining Security Alert & Monitoring
  • Enhancing Enterprise Security
  • Exploring Identity & Access Management
  • Examining Automation & Orchestration Security Operations
  • Exploring Incident Response
  • Examine Investigative Data Sources
Learning Options

Options for this course