Preemptive Troubleshooting: Concepts & Strategies


Overview/Description
Expected Duration
Lesson Objectives
Course Number
Expertise Level



Overview/Description

Explore preemptive troubleshooting for your organization's cyber security in this 14-video course, which examines available strategies, tools, best practices, and security policies to keep your system secure. First, you will examine how preemptive troubleshooting applies to security in SecOps and how it is different from intrusion detection systems and intrusion prevention systems. This course then demonstrates several scenarios that a SOC (security operations center) can use when troubleshooting network issues and system compromise. Learn best practices, including spotting weak passwords, hardware and software vulnerabilities, and security policies and procedures to keep systems secure. You will also learn how to use password policies, auditing, and how to prevent security compromises. This course demonstrates how threat hunters can help spot threats before they occur. Learners will study the policies and tools for troubleshooting hardware. Finally, you will learn how software and hardware update policies can aid in keeping system secure, and how preemptive resolution and training can help an organization to better secure its systems.



Expected Duration (hours)
1.4

Lesson Objectives

Preemptive Troubleshooting: Concepts & Strategies

  • discover the key concepts covered in this course
  • describe preemptive troubleshooting and how it applies to security and SecOps
  • recognize how preemptive troubleshooting is different than intrusion detection systems
  • describe policies and procedures for keeping systems secure in preemptive troubleshooting
  • use tools to troubleshoot hardware and policies to prevent security compromise
  • use password policies to enforce compliance
  • update software and recognize the importance of doing so
  • update hardware and recognize the importance of doing so
  • describe how indicators of compromise can help reduce exploits in an environment
  • identify how a security operations center can be a vital asset to an organization
  • recognize how threat hunters can help spot threats before they occur
  • differentiate between being preemptive and reactive in troubleshooting
  • demonstrate how training can keep an organization secure
  • summarize the key concepts covered in this course
  • Course Number:
    it_soprtsdj_01_enus

    Expertise Level
    Intermediate