Course Provider
What will you learn in Preparing for Information Security Audits (SKO 0905) course?
- The first course, Planning a Security Incident Response is designed to help one manage an enterprise security incident.
- The learners will also get a comprehensive idea about threat detection in on-premise, cloud and hybrid environments.
Preparing for Information Security Audits (SKO 0905)
-
Skill Type
Emerging Tech
- Domain
cyber security
- Course Category
Deepskilling Course
- Certificate Earned Joint Co-Branded Participation Certificate
- Course Covered under GoI Incentive
Yes
-
- Course Price
INR 2,999+ 18% GST
- Course Duration
15 Hours
- Course Price
Why you should take Preparing for Information Security Audits (SKO 0905) course?
- The course, is designed to help you manage an enterprise security incident .
- This course deals in cyber security maintenance techniques like penetration testing, posture testing, ethical hacking etc.
- It also gives a comprehensive idea about threat detection in on-premise, cloud and hybrid environments.
Who should take Preparing for Information Security Audits (SKO 0905) course?
This course is designed for those who want to manage an enterprise security incident, while avoiding common errors, increasing both the effectiveness and efficiency of the incident response efforts.
Curriculum
Course 1
- Module 1
- Introduction
- What is threat modelling?
- Key Takeaways from Cyberattacks
- Cyber Threat modeling
- NIST Cybersecurity Framework
- Prepare for a security incident
- Phases of a major response
- Recovery preparations
- Critical success factors
- Module 2
- Incident Response Policy, Plan, and Procedure Creation
- Creation of a CSIRT
- List for developing a CSIRT
- Team duties
- Team preparations
- Establishing team roles
- CSIRT communications
- Recovering your systems
- Key Takeaways
- Module 3
- The security incident report
- Practice walking through a security incident report
- Next steps
Course 2
- Module 1
- Introduction to threat detection as part of the defense in-depth strategy
- An overview of the modern cyber threat landscape
- Integrating pre-breach and post-breach approaches to mitigate cyber threats
- Comparing signature-based and behavioural/heuristic detection methods
- Combating threat persistence
- Module 2
- Detecting threats in on-premises environments
- Windows Defender Advanced Threat Protection
- Microsoft Advanced Threat Analytics
- Microsoft Enterprise Threat Detection
- Microsoft Security Risk Detection
- Antimalware Scan Interface
- Logging and Auditing
- Threat detection tools
- Module 3 – Detecting threats in hybrid and cloud environments
- Office 365 Advanced Threat Protection
- Office 365 Cloud App Security and Microsoft Cloud App Security
- Azure Advanced Threat Detection
- Azure Active Directory Identity Protection
- Azure Active Directory Identity Threat Detection
- Microsoft Operations Management Suite (OMS)
- Azure Security Center
- Advanced Threat Detection Features - Other Azure Services
- Third-party ATD capabilities through Azure Marketplace
- Azure Logging and Auditing
- Microsoft 365
- Module 4
- Analyzing threat detection solutions in action
- Detecting persistent threats by using Windows Defender Advanced Threat Protection and Advanced Threat Analytics
- Enterprise Threat Detection behavioral monitoring
Tools you will learn in Preparing for Information Security Audits (SKO 0905) course:
Azure
FAQs
A security incident response is a planned and organized response to a security breach or cyber-attack. The objective of a security incident response is to limit the damage that has been caused, or may be caused, as a result of such a breach. It must also seek to reduce the time it takes to recover from the incident and limit the costs as much as possible.