In this 14-video course, you will learn how to drive system configuration monitoring by using tools to keep systems secure and the importance of monitoring system configuration within an organization for incident response. Key concepts covered here include the configuration management (CM) process and how it can influence securing system configuration for incident response; tools and software to monitor systems and their advantages for incident response; and continuous monitoring in risk management, including the three-tier approach. Next, learn the process of minor, major, and unknown configuration changes; learn the importance of securing CM processes in the software development lifecycle (SDLC) for preventing security impacts; and observe methods for identifying common high probability items, such as identifying default or weak credentials. Continue by learning to implement a secure system CM program; and how to assess the monitoring process and perform security configuration evaluations. Finally, observe methods of monitoring releases and deliveries throughout SDLC; learn security controls for monitoring system configuration in a cyber framework; and learn how monitoring system configuration is important in today's enterprise SDLC.
describe the configuration management process and how it can influence securing system configuration for incident response
describe tools and software available to monitor systems and their advantages for incident response
describe continuous monitoring in risk management, including the three-tier approach and how it relates to monitoring system configuration
recognize the process of minor, major, and unknown configuration changes, including what it means to an organization in terms of incident response and how they are prioritized in an incident strategy
recognize the importance of securing the CM process in the SDLC for preventing security impacts
recognize methods for identifying common high probability items, such as identifying default or weak credentials
describe the process of implementing a secure system configuration monitoring program
assess the monitoring process and perform a security configuration evaluation
recognize methods of monitoring releases and deliveries throughout the software development lifecycle
describe security controls for monitoring system configuration in a cyber framework
recognize challenges organizations face today in monitoring system configuration and how they can be overcome
recognize how monitoring system configuration is important in today's enterprise SDLC