このコースについて
8,333 最近の表示

100%オンライン

自分のスケジュールですぐに学習を始めてください。

柔軟性のある期限

スケジュールに従って期限をリセットします。

初級レベル

約21時間で修了

推奨:5 hours/week...

英語

字幕:英語

100%オンライン

自分のスケジュールですぐに学習を始めてください。

柔軟性のある期限

スケジュールに従って期限をリセットします。

初級レベル

約21時間で修了

推奨:5 hours/week...

英語

字幕:英語

シラバス - 本コースの学習内容

1
4時間で修了

Understand the Risk Management Process

Module Topic: Risk Visibility and Reporting, Risk management Concepts, Risk Assessment, Risk Treatment, Audit Findings. In Risk visibility and Reporting, you will learn about risk register, creating a risk register, risk register, and risk management steps. In Risk Management Concepts, you will learn about, key terms, and generic risk model with key factors - NIST SP 800-30 R1. In risk Assessment, you will learn about NIST SP 800- 30 R1 risk assessment methodology, Step 1. prepare for the assessment, Step 2. conduct the assessment, Step 2a. identify threat sources, step 2b. identify potential threat events, step 2c. identify vulnerabilities and predisposing conditions, step 2d. determine likelihood, step 2e. determine impact, step 2f. risk determination, risk level matrix, risk levels, step 3. communicating and sharing risk assessment information, step 4. maintaining the risk assessment, and risk assessment activity. In Risk Treatment, you will learn about, risk mitigation, example control: passwords, control selection, residual risk, risk transference, risk avoidance, and risk acceptance. In audit Findings, you will learn about auditors, types of audits, audit methodologies, auditor responsibilities, audit scope, documentation, and response to audit.

...
14件のビデオ (合計84分), 14 readings, 1 quiz
14件のビデオ
Risk Management Process: Creating a Risk Register7 分
Risk Management Process: Risk Register Risk Management Steps8 分
Risk Management Process: Key Terms5 分
Risk Management Process: Key Terms6 分
Risk Management Process: Risk Assessment3 分
Risk Management Process: Preparation Steps7 分
Risk Management Process: Step 2b4 分
Risk Management Process: Quantitative Analysis8 分
Risk Management Process: Qualitative Analysis5 分
Risk Management Process: Step 33 分
Risk Management Process: Risk Treatment5 分
Risk Management Process: Risk Avoidance5 分
Risk Management Process: Type of Audits7 分
14件の学習用教材
Risk Management Process: Risk Visibility and Reporting10 分
Risk Management Process: Creating a Risk Register10 分
Risk Management Process: Risk Register Risk Management Steps10 分
Risk Management Process: Key Terms10 分
Risk Management Process: Key Terms10 分
Risk Management Process: Risk Assessment10 分
Risk Management Process: Preparation Steps10 分
Risk Management Process: Step 2b10 分
Risk Management Process: Quantitative Analysis10 分
Risk Management Process: Qualitative Analysis10 分
Risk Management Process: Step 310 分
Risk Management Process: Risk Treatment10 分
Risk Management Process: Risk Avoidance10 分
Risk Management Process: Type of Audits10 分
1の練習問題
Quiz 120 分
2
3時間で修了

Perform Security Assessment Activities

Module Topics: Participate in Security and Test Results, Penetration Testing. In Participate in Security and Test Results, you will learn about vulnerability scanning and analysis, vulnerability testing software categories, vulnerability testing qualities, potential problems, host scanning, host security considerations, traffic types, security gateway types, wireless networking testing, potential security issues, searching for rogue access points, locking down the enterprise, wireless tools, war dialing, and war driving. In Penetration Testing you will learn about penetration testing modes, white box / hat, gray box / hat, black box / hat, phase 1: preparation, reporting, phase 2: reconnaissance and network mapping techniques, reconnaissance, social engineering and low-tech reconnaissance, whois attacks, DNS zone transfers, network mapping, network mapping techniques, firewalking, basic built-in tools, phase 3: information evaluation and risk analysis, phase 4: active penetration, phase 5: analysis and reporting, penetration testing high-level steps.

...
11件のビデオ (合計73分), 11 readings, 1 quiz
11件のビデオ
Security Assessment Activities: Potential Problems6 分
Assessment Activities: Security Gateway Types5 分
Security Assessment Activities: Potential Security Issues6 分
Security Assessment Activities: Penetration Testing6 分
Security Assessment Activities: White Box / Hat8 分
Security Assessment Activities: Reconnaissance4 分
Security Assessment Activities: DNS Zone Transfers7 分
Security Assessment Activities: Network Mapping Techniques9 分
Security Assessment Activities: Firewalking6 分
Security Assessment Activities: Active Penetration6 分
11件の学習用教材
Security Assessment Activities: Participate in Security and Test Results10 分
Security Assessment Activities: Potential Problems10 分
Assessment Activities: Security Gateway Types10 分
Security Assessment Activities: Potential Security Issues10 分
Security Assessment Activities: Penetration Testing10 分
Security Assessment Activities: White Box / Hat10 分
Security Assessment Activities: Reconnaissance10 分
Security Assessment Activities: DNS Zone Transfers10 分
Security Assessment Activities: Network Mapping Techniques10 分
Security Assessment Activities: Firewalking10 分
Security Assessment Activities: Active Penetration10 分
1の練習問題
Quiz 220 分
3
4時間で修了

Operate and Maintain Monitoring Systems & Analyze and Report Monitoring Results

Module Topics: Events of Interest, Logging, source Systems, Security Analytics, metrics, and Trends, Visualization, Event Data Analysis, Communication of Findings. In Events of Interest you will learn about, monitoring terminology, Intrusion Detection System (IDS)/Intrusion Prevention System (IPS), comparing IDS and IPS, types of IDS/IPS devices, deploying HIDS and NIDS, implementation issues for monitoring, monitoring control, other considerations, sample questions to consider, collecting data for incident response, monitoring response techniques, attackers, attacker motivations, intrusions, events, types of monitoring, and file integrity checkers, continuous/compliance monitoring. In Logging, you will learn about reviewing host logs, reviewing incident logs, log anomalies, log management, clipping levels, filtering, log consolidation, log retention, centralized logging (syslog and log aggregation), syslog, distributed log collectors, hosted logging services, configuring event sources (s-flow, NetFlow, sniffer), Cosco NetFlow, What is an IP Flow, IP packet attributes, understanding network behavior, how to access the data produced by NetFlow, How does the router or switch determine which flows to export to the NetFlow collector server, format of the export data, sFlow, event correlation systems (security, information, and event management (SIEM)), SIEM functions, compliance, enhanced network security and improved IT/security operations, and full packet capture. In Source System, you will learn about comprehensive application, middleware, OS, and infrastructure monitoring, hyper capabilities, and operations manager. Analyze and Report Monitoring: In Security Analytics, Metrics, and Trends, you will learn about security baseline, network security baseline, metrics and analysis (MA), systems security engineering capability maturity model (SSE-CMM), and potential metrics. In visualization topic, you will learn about data visualization tools. In Event Data Analysis, you will learn about logs, log management, log management recommendations, and Potential uses of server log data. In Communication of Findings, you will learn about checklist for report writers and reviewers.

...
12件のビデオ (合計75分), 12 readings, 1 quiz
12件のビデオ
Monitoring Systems: IDS/IPS5 分
Monitoring Systems: Implementation Issues for Monitoring6 分
Maintain Monitoring Systems: Sample Questions6 分
Maintain Monitoring Systems: Attacker Motivations7 分
Maintain Monitoring Systems: Logging5 分
Maintain Monitoring Systems: Log Anomalies5 分
Maintain Monitoring Systems: Log Retention6 分
Monitoring Systems: Compliance6 分
Monitoring Results: Security Baseline6 分
Monitoring Results: SSE-CMM6 分
Monitoring Results: Potential Uses of Server Log Data6 分
12件の学習用教材
Monitoring Systems: Monitoring Terminology10 分
Monitoring Systems: IDS/IPS10 分
Monitoring Systems: Implementation Issues for Monitoring10 分
Maintain Monitoring Systems: Sample Questions10 分
Maintain Monitoring Systems: Attacker Motivations10 分
Maintain Monitoring Systems: Logging10 分
Maintain Monitoring Systems: Log Anomalies10 分
Maintain Monitoring Systems: Log Retention10 分
Monitoring Systems: Compliance10 分
Monitoring Results: Security Baseline10 分
Monitoring Results: SSE-CMM10 分
Monitoring Results: Potential Uses of Server Log Data10 分
1の練習問題
Quiz 320 分
4
4時間で修了

Incident Response and Recovery

Module Topics: Preparation, Detection and Analysis, Containment, Eradication, and Recovery, Post-Incident Activity, Implementation of Countermeasures. In Introduction, you will learn about incident response, and basic definitions. In preparation, you will learn about elements of an incident response policy, incident response plan, training, incident response tools, communication planning, communication with law enforcement, media, requirements for effective incident handling, the incident response team, core team areas, centralized and decentralized teams, team structure, team conditions that support success, and other considerations. In Detection and Analysis, you will learn about Intrusion Detection Systems (IDS) and Intrusion Prevention Systems (IPS), types of intrusion systems, intrusion detection techniques, false positives and false negatives, anti-malware systems, security information event management (SIEM), Incident analysis, packet sniffers, Inline SSL decryption devices, incident documentation, records, assessing risk, response, containment strategy considerations, Delaying containment, areas of focus, defining an incident, triage, and notification. In Containment, Eradication, and Recovery, you will learn about common containment activities, and eradication. In post-incident activity, you will learn about effective incident response. In implementation of Countermeasures, you will learn about implementation steps.

...
13件のビデオ (合計77分), 13 readings, 1 quiz
13件のビデオ
Incident Handling: Preparation6 分
Incident Handling: Training6 分
Incident Handling: Communication Planning7 分
Incident Handling: The Incident Response Team7 分
Incident Handling: IDS and IPS4 分
Incident Handling: Intrusion Detection Techniques7 分
Incident Handling: Anti-Malware Systems2 分
Incident Handling: Packet Sniffers6 分
Incident Handling: SSL Decryption Devices4 分
Incident Handling: Records6 分
Incident Handling: Delaying Containment6 分
Incident Handling: Containment, Eradication, and Recovery4 分
13件の学習用教材
Incident Handling: Incident Response10 分
Incident Handling: Preparation10 分
Incident Handling: Training10 分
Incident Handling: Communication Planning10 分
Incident Handling: The Incident Response Team10 分
Incident Handling: IDS and IPS10 分
Incident Handling: Intrusion Detection Techniques10 分
Incident Handling: Anti-Malware Systems10 分
Incident Handling: Packet Sniffers10 分
Incident Handling: SSL Decryption Devices10 分
Incident Handling: Records10 分
Incident Handling: Delaying Containment10 分
Incident Handling: Containment, Eradication, and Recovery10 分
1の練習問題
Quiz 420 分
4.9
4件のレビューChevron Right

Identifying, Monitoring, and Analyzing Risk and Incident Response and Recovery からの人気レビュー

by AJan 16th 2019

this was the best of all the courses that i have gone through i think i might say that now i can be able to detect incidence and recovery by now

by AAMar 27th 2019

Course was really helpful for all the security professionals.

講師

Avatar

(ISC)² Education & Training

Education & Training

(ISC)²について

(ISC)² is an international nonprofit membership association focused on inspiring a safe and secure cyber world. Best known for the acclaimed Certified Information Systems Security Professional (CISSP®) certification, (ISC)2 offers a portfolio of credentials that are part of a holistic, programmatic approach to security. www.isc2.org ...

(ISC)² Systems Security Certified Practitioner (SSCP) の専門講座について

Pursue better IT security job opportunities and prove knowledge with confidence. The SSCP Professional Training Certificate shows employers you have the IT security foundation to defend against cyber attacks – and puts you on a clear path to earning SSCP certification. Learn on your own schedule with 120-day access to content aligned with the latest (ISC)2 SSCP exam domains. We’re offering the complete online self-paced program for only $1,000 – a $200 savings when you get all domains bundled together. 3 Steps to Career Advancement 1. Register for the course 2. Gain access for 120 days 3. Register and sit for the SSCP certification exam Upon completing the SSCP Professional Certificate, you will: 1. Complete six courses of preparing you to sit for the Systems Security Certified Practitioner (SSCP) certification exam as outlined below. Course 1 - Access Controls Course 2 - Security Operations and Administration Course 3 - Risk Identification, Monitoring, and Analysis/Incident Response and Recovery Course 4 - Cryptography Course 5 - Network and Communication Security Course 6 - Systems and Application Security 2. Receive a certificate of program completion. 3. Understand how to implement, monitor and administer an organization’s IT infrastructure in accordance with security policies and procedures that ensure data confidentiality, integrity and availability....
(ISC)² Systems Security Certified Practitioner (SSCP)

よくある質問

  • はい、最初のビデオをプレビューしてシラバスを表示してから登録できます。プレビューに含まれないコンテンツにアクセスするには、コースを購入する必要があります。

  • セッションの開始日前にコースに登録すると、そのコースに関するすべての講座のビデオと学習用教材にアクセスできます。課題は、セッションの開始後に提出できるようになります。

  • 登録してセッションを開始すると、すべてのビデオや、学習用教材項目やコースのディスカッションフォーラムなど他のリソースにアクセスできます。演習の評価を表示して提出したり、成績とコース修了証の取得に必要なテストを完了することができます。

  • コースを無事完了すると、コースの電子修了証が成果のページに追加されます。そこからコースの修了証を印刷したり、LinkedInのプロフィールに追加したりできます。

  • このコースは現在、利用できる期間内において、支払い済み受講生または学資援助を受けた受講生のみが利用できるCoursera(コーセラ)提供のコースです。

  • The course schedule contains approximately 21 hours of content material covering lectures, reading materials, a case study, and quizzes broken up over the course of 7 weeks

さらに質問がある場合は、受講者向けヘルプセンターにアクセスしてください。