In this webcast, we will be walking through some configuration changes required in order to detect attacks. We will also show you exactly what those logs will produce when configured properly.
Finally, we show you tools like LogonTracer, DeepBlueCLI, and some cool basic PowerShell to pull out...
12 courses // 54 videos // 8 hours of training
Information Security Fundamentals training
This learning path builds on your existing IT knowledge and introduces you to fundamental information security concepts and areas. You’ll gain confidence in your cybersecurity skills as you progress...
This learning path builds a foundation of skills around information security auditing. As you progress through 17 courses, you’ll learn how to audit many different aspects of an organization, including business system application and development, disaster recovery and continuity planning...
In this CISO certification training, you will learn what other CISO’s are focusing their time and attention on. Among the key topics, you will learn how to implement the proven best practices that make for successful cyber security leadership.
Link:
*** Hidden text: You do not have sufficient...
Building and operating an information security program at your organization can be challenging. The scope can be vast and complex. Thinking of all the ways an organization can fail and coming up with actionable measures you can take to prevent issues, mitigate risk, or recover from events is a...
Information security isn’t all ones and zeros. While the people, processes, and technology we rely on to protect our data is critically important, so are the communication skills to help the rest of the organization understand the value and the necessity of those controls. This course was...
Vendor Risk Management | TPRM Lifecycle | GRC | IT Audit
What you’ll learn:
Third Party Risk Management
Third Party Risk Management Lifecycle
Planning and preparation
Selection and Due Diligence
Contract Negotiation and Onboarding
Incident Management and Response
Termination and Offboarding...
Vendor Risk Management | TPRM Lifecycle | GRC | IT Audit
What you’ll learn:
Third Party Risk Management
Third Party Risk Management Lifecycle
Planning and preparation
Selection and Due Diligence
Contract Negotiation and Onboarding
Incident Management and Response
Termination and Offboarding...