Course Summary
This course is organized specifically to provide a risk-driven method for tackling the enormous task of designing an enterprise security validation program, covering systems, applications, and the cloud. After covering a variety of high-level audit issues and general audit best practices, students will have the opportunity to delve into the technical “how-to” for determining the key controls that can be used to provide a high level of assurance to an organization. Real-world examples provide students with tips on how to verify these controls in a repeatable way, as well as many techniques for continuous monitoring and automatic compliance validation. These same real-world examples help the students learn how to be most effective in communicating risk to management and operations staff. Auditing, risk assessments, and reporting
Network and perimeter auditing and monitoring, web application auditing
Auditing and monitoring in windows and Unix environments
Auditing Access Control and Data Handling in Web Applications
The candidate will demonstrate knowledge of auditing web application access control and data handling.
Auditing the Enterprise Network
The candidate will demonstrate knowledge of the terms, concepts and processes associated with enterprise networks including cloud computing, containers, and physical networks.
Auditing UNIX and Linux Systems
The candidate will demonstrate knowledge of how to audit UNIX and Linux systems using common techniques, tools, and scripting commands to determine process information, access controls, and system configurations.
Auditing Web Applications
The candidate will demonstrate knowledge of auditing web applications.
Auditing Windows Systems and Domains
The candidate will demonstrate knowledge of how to audit Windows systems using common techniques, tools, and scripting commands to determine process information, access controls, and system configurations.
Risk Assessment for Auditors
The candidate will demonstrate knowledge of basic risk auditing terms and concepts, and how to perform an auditing risk assessment.
The Audit Process
The candidate will demonstrate knowledge of basic auditing terms and concepts and demonstrate familiarity with the audit process, baselines, time based security concepts, and how risk assessment are used to identify and specify controls.
UNIX and Linux Logging and Continuous Monitoring
The candidate will demonstrate knowledge of how to gather and interpret logging information from UNIX and Linux systems, and how to use continuous monitoring to achieve ongoing audit compliance.
Windows Logging and Continuous Monitoring
The candidate will demonstrate knowledge of how to gather and interpret logging information from Windows systems, and how to use continuous monitoring to achieve ongoing audit compliance.
Other Popular Courses
CompTIA: SecurityX
- Duration: 5 Days
- Language: English
- Level: Advanced
- Exam: CAS-005
Executive Cyber Risk Certification (ECRC)
- Duration: 2 Days
- Language: English
- Level: Advanced
- Exam: ECRC
Mastering Communication & Presentation Te...
- Duration: 5 Days
- Language: Danish
- Level: Intermediate
- Exam: MCPT