Security Operations
Security Operations Overview
In this course, we will explore various security concepts, securing computing resources, asset and vulnerability management, enterprise security, identity and access management (IAM) and more.
0h 4m
WEBVTT
Welcome and thanks for
joining us for this overview
for the Security Operations
course. I'm Sophie Goodwin,
I'm an edutainer and a host
here at ACI Learning. I'm also
certified in cybersecurity
through ISC2, recently obtained
that certification. With me is
Wes Bryan. Mr. Wes Bryan is
going to be our SME for this
course. I'll be your learner
advocate asking questions along
the way. But Wes, tell me a
little about yourself. Sure,
yeah, I've been teaching
technical courses now for,
man, I keep saying better than
a decade. It's actually going
up closer to 15 years now.
And it's been a great journey,
right? I've taught security
certifications, I've taught
CompTIA certifications,
Microsoft certifications,
I've actually gone to military
bases and taught military
personnel, DOD security
training. So definitely got a
background in it. I was a
former mentored learning
instructor too, so I would help
people as they were tackling
courses. Maybe they're sitting
certification. Sometimes we
didn't even have people doing
certifications. They just said,
hey, we've got 12 people that
need to know how to do this for
their company and can you
support it? Can you help us,
right? So I look forward to
jumping into this security
operations course
and showing you some of the
specifications in the language.
But also showing you some of
the practical application stuff
that we can see here. And I
believe the background I have
in training will definitely
help that and we'll exude that
during this course. I know I
said Wes was going to be our
SME for this course. I did not
mean an animated pirate.
He is our SME, our subject
matter expert. So he'll be
walking us through this course.
What can we expect as we start
to watch this course on
security operations? What are
we
going to learn? Okay, so
we're going to learn a variety
of technologies and techniques
that we can implement inside of
our organization. We're going
to learn things
like, for instance, what
does the incident response look
like? What does vulnerability
management look like? We're
going to look at some of the
benefits of
security automation. How do we
benefit from implementing
security or excuse me, how do
security operations benefit
from implementing automation
and scripting? We're going to
look at how we secure our
operating systems. We're going
to look at some basic security
practices. We'll talk about
additional tactics as well.
But it's going to be at the end
of the day, how do we secure
the operations? How do we
implement security
implementations and protection
measures to make sure that our
operations operate smoothly
and that we have business
continuity? We want to be a
smooth operator, for sure.
So before we jump into this
course head first, let's make
sure we've got all our ducks in
a row. Is there anything that
we
as learners need to bring to
the table? Any prerequisite
knowledge? Yes, there is.
Okay, so with this being more
of a security centric training
course,
then
what we're going to do is that
we're going to
assume that you have network
knowledge.
You need to have a strong
understanding of general
computing. I would say that you
need to know computing from a
Windows side because it is
common. I would know some of
the terminology around Linux
and Unix, you definitely don't
have to be proficient with it.
You really
don't have
to be proficient in any of
these operating systems,
but you're going to have to
backfill what experience maybe
you don't have in those.
So if you come to the table and
you've already got a strong
foundational knowledge for just
generalized computing
and networking technologies and
how things
like client server networks
work, how TCP IP works, then
you're
going to do really, really good
here. And even if you don't
have
that, I want you to understand,
please come to the table.
We're going to train
you as well. But there is going
to be some assumed knowledge
that we're not going to spend a
lot of time on. And I would
encourage you that if we don't
spend
the time on that information,
then that is assumed
information. And I would just
spend a little bit
more time studying it. But I
don't want you to think that if
you don't have
that, this course is not for
you. Couldn't be farthest from
the truth. We will teach
anybody even if you are a
career changer. Just remember,
it might be a little extra work
you have to do on your end.
Sure. So if you're not
familiar with any of that
information, maybe take a look
and get yourself familiar
before you jump in. But if
you're already an expert in
networking, well, then this
sounds like it's the course for
you. So I think that's going to
do it for
this overview now that we've
got an idea of who Wes is,
who I am, and what we're going
to be learning. Thank you so
much for walking us through
that, Wes, and thank you for
joining us. We'll see you in
the course.
Overview
In this course, we will explore various security concepts, securing computing resources, asset and vulnerability management, enterprise security, identity and access management (IAM) and more.
Learning Style
On Demand
Length of course
8h 18m
25 Episodes
Here are the topics we'll cover
- Course Overview
- Securing Computing Resources
- Examining Asset Management
- Examining Vulnerability Management
- Examining Security Alert & Monitoring
- Enhancing Enterprise Security
- Exploring Identity & Access Management
- Examining Automation & Orchestration Security Operations
- Exploring Incident Response
- Examine Investigative Data Sources
Learning Options