Course Summary

This course is organized specifically to provide a risk-driven method for tackling the enormous task of designing an enterprise security validation program, covering systems, applications, and the cloud. After covering a variety of high-level audit issues and general audit best practices, students will have the opportunity to delve into the technical “how-to” for determining the key controls that can be used to provide a high level of assurance to an organization. Real-world examples provide students with tips on how to verify these controls in a repeatable way, as well as many techniques for continuous monitoring and automatic compliance validation. These same real-world examples help the students learn how to be most effective in communicating risk to management and operations staff. Auditing, risk assessments, and reporting
Network and perimeter auditing and monitoring, web application auditing
Auditing and monitoring in windows and Unix environments

Auditing Access Control and Data Handling in Web Applications
The candidate will demonstrate knowledge of auditing web application access control and data handling.
Auditing the Enterprise Network
The candidate will demonstrate knowledge of the terms, concepts and processes associated with enterprise networks including cloud computing, containers, and physical networks.
Auditing UNIX and Linux Systems
The candidate will demonstrate knowledge of how to audit UNIX and Linux systems using common techniques, tools, and scripting commands to determine process information, access controls, and system configurations.
Auditing Web Applications
The candidate will demonstrate knowledge of auditing web applications.
Auditing Windows Systems and Domains
The candidate will demonstrate knowledge of how to audit Windows systems using common techniques, tools, and scripting commands to determine process information, access controls, and system configurations.
Risk Assessment for Auditors
The candidate will demonstrate knowledge of basic risk auditing terms and concepts, and how to perform an auditing risk assessment.
The Audit Process
The candidate will demonstrate knowledge of basic auditing terms and concepts and demonstrate familiarity with the audit process, baselines, time based security concepts, and how risk assessment are used to identify and specify controls.
UNIX and Linux Logging and Continuous Monitoring
The candidate will demonstrate knowledge of how to gather and interpret logging information from UNIX and Linux systems, and how to use continuous monitoring to achieve ongoing audit compliance.
Windows Logging and Continuous Monitoring
The candidate will demonstrate knowledge of how to gather and interpret logging information from Windows systems, and how to use continuous monitoring to achieve ongoing audit compliance.

There are currently no prerequisites for this course. However deeper Linux experience will be helpful but is not required.

proctored exam 115 questions 3 hours Minimum passing score of 72%

Following your booking, a confirmation message will be sent to all participants, ensuring you're well-informed of your successful enrollment. Calendar placeholders will also be dispatched to assist you in scheduling your commitments around the course. Rest assured, all course materials and access to necessary labs or platforms will be provided no later than one week before the course begins, allowing you ample time to prepare and engage fully with the learning experience ahead.

Our comprehensive training package includes all the necessary materials and resources to facilitate a full learning experience. Enrollees will be provided with detailed course content, encompassing a wide array of topics to ensure a thorough understanding of the subject matter. Additionally, participants will receive a certificate of completion to recognize their dedication and hard work. It's important to note that while the course fee covers all training materials and experiences, the examination fee for certification is not included but can be purchased separately.

Questions About This Course?