Companies Home Search Profile

Evaluating Your Organization’s Security Posture

Focused View

Paul Mealus

3:22:35

83 View
  • evaluating-organizations-security-posture.zip
  • 1. Course Overview.mp4
    01:38
  • 1. Overview.mp4
    02:14
  • 2. Practices of an Evaluation.mp4
    02:39
  • 3. Metrics and Measurements Primer.mp4
    01:44
  • 4. Introduction to the Scenario.mp4
    03:06
  • 5. Demo - Risk Assessment in Eramba.mp4
    15:32
  • 6. Summary.mp4
    01:17
  • 1. Overview.mp4
    01:48
  • 2. Logical Areas of IT.mp4
    02:39
  • 3. New and Evolving Areas of IT.mp4
    03:23
  • 4. Basics of Planning and Organizing Your Evaluation.mp4
    02:57
  • 5. Demo - Building a Project Plan in Trello.mp4
    06:01
  • 6. The Info Gathering Cycle.mp4
    00:54
  • 7. Frameworks for Guiding Evaluations.mp4
    05:40
  • 8. Demo - Review the Top 20 CIS Controls in Eramba.mp4
    01:47
  • 9. Summary.mp4
    00:47
  • 1. Overview.mp4
    01:07
  • 2. Types of Evidence.mp4
    04:20
  • 3. Policies and Procedures.mp4
    02:43
  • 4. Tips and Tricks for Interviews.mp4
    03:52
  • 5. Maintaining Evidence Integrity.mp4
    01:40
  • 6. Demo - Generating a Hash with PowerShell.mp4
    02:58
  • 7. Summary.mp4
    01:00
  • 01. Overview.mp4
    00:57
  • 02. Understanding Layers of Physical Security.mp4
    03:03
  • 03. Threats and Vulnerabilities.mp4
    01:21
  • 04. Outer Perimeter Controls and Countermeasures.mp4
    01:27
  • 05. Inner Perimeter Controls and Countermeasures.mp4
    03:57
  • 06. Locks, Badges, and CCTV.mp4
    03:05
  • 07. Work Center Security.mp4
    02:12
  • 08. Inventory and Vendor Management.mp4
    02:34
  • 09. Testing and Assessing Physical Controls.mp4
    01:21
  • 10. Summary.mp4
    01:14
  • 01. Overview.mp4
    02:32
  • 02. Why You Should Map Your External Footprint.mp4
    04:18
  • 03. The Process of Evaluating Your External Environment.mp4
    01:56
  • 04. Enumerating Subdomains & Demo.mp4
    03:17
  • 05. Email Addresses Are a Target.mp4
    01:05
  • 06. Evaluating Your Cloud Tenant.mp4
    03:44
  • 07. Assessing Web Apps.mp4
    01:53
  • 08. Assessing Bug Tracking & Release Cycles.mp4
    04:26
  • 09. Questions for Penetration Testing and Vulnerability Scanning.mp4
    03:39
  • 10. Considerations for SaaS.mp4
    02:28
  • 11. Demo - Finding Secrets in GitHub.mp4
    03:42
  • 12. Summary.mp4
    01:59
  • 01. Overview.mp4
    02:41
  • 02. Assessing AD and Administrators.mp4
    04:05
  • 03. IT Services and Account Lifecycle.mp4
    03:28
  • 04. Investigating Email Security.mp4
    02:29
  • 05. Assessing NTP.mp4
    01:45
  • 06. Evaluating Log Practices.mp4
    01:31
  • 07. Digging into Fileshares.mp4
    02:17
  • 08. DNS Security Posture.mp4
    03:43
  • 09. Evaluating Networking.mp4
    03:13
  • 10. Vulnerability Management.mp4
    02:20
  • 11. All About Incident Response.mp4
    05:27
  • 12. Summary.mp4
    00:56
  • 1. Overview.mp4
    02:30
  • 2. Assessing Employee Security Training.mp4
    03:37
  • 3. Avenues of Social Engineering.mp4
    04:03
  • 4. Why to Focus Efforts on Phishing.mp4
    02:21
  • 5. Gophish Demo.mp4
    07:34
  • 6. Summary.mp4
    01:34
  • 01. Overview.mp4
    02:22
  • 02. Creating Measurements and Metrics.mp4
    01:42
  • 03. Planning and Organizing Measures.mp4
    01:20
  • 04. Evidence Measures.mp4
    01:21
  • 05. Physical Measures.mp4
    00:56
  • 06. External Measures.mp4
    01:37
  • 07. Internal Measures.mp4
    01:14
  • 08. Social Engineering Measures.mp4
    00:57
  • 09. Dashboard Example.mp4
    02:16
  • 10. Summary.mp4
    01:07
  • 1. Completing the Evaluation.mp4
    04:13
  • Description


    This course will teach you about completing a holistic security evaluation, and how to shape it into a repeatable practice that helps raise the IT security posture for the whole company.

    What You'll Learn?


      Assessing your organization’s security is a long process consisting of many moving parts. In this course, Evaluating Your Organization’s Security Posture, you will gain the ability to complete an end-to-end security evaluation to provide a “map” of your company’s security posture. First, you will learn about the practices of security evaluation. Next, you will discover the many tools and techniques available. Finally, you will explore how to effectively juggle the amount of work, evidence, and data collection required of an assessment. When you’re finished with this course, you will have the skills and knowledge of auditing, governance, and critical thinking needed to evaluate your organization’s security.

    More details


    User Reviews
    Rating
    0
    0
    0
    0
    0
    average 0
    Total votes0
    Focused display
    Paul started building computers in high school. He feels lucky to have received life lessons and technical training in the United States Air Force. Throughout his career he has been part of many project teams ranging from single server deployments, to data center refreshes, to cloud migrations. He believes in being a well rounded IT practitioner and studying all aspects of technology. In the future he plans to move into IT leadership roles or build his own company. In his free time Paul enjoys writing, travel, and practicing mixed martial arts.
    Pluralsight, LLC is an American privately held online education company that offers a variety of video training courses for software developers, IT administrators, and creative professionals through its website. Founded in 2004 by Aaron Skonnard, Keith Brown, Fritz Onion, and Bill Williams, the company has its headquarters in Farmington, Utah. As of July 2018, it uses more than 1,400 subject-matter experts as authors, and offers more than 7,000 courses in its catalog. Since first moving its courses online in 2007, the company has expanded, developing a full enterprise platform, and adding skills assessment modules.
    • language english
    • Training sessions 74
    • duration 3:22:35
    • level average
    • English subtitles has
    • Release Date 2023/02/28

    Courses related to Cyber Security

    Courses related to Cyber Security Awareness