Windows System Security Auditing 3-Day Course
The number, volume, and variety of computer security logs have increased greatly, which has created the need for a greater understanding of computer security log management. Log management is an essential component for an organization to ensure that computer security records are stored in sufficient detail for an appropriate period of time. Routine log analysis is beneficial for identifying security incidents, policy violations, fraudulent activity, and operational problems. Logs are also useful when performing auditing and forensic analysis, supporting internal investigations, establishing baselines, and identifying operational trends and long-term organizational problems. Lunarline’s 3-day, hands-on course will assists organizations in establishing log management and auditing policies and procedures to discover and handle incidents efficiently and effectively. Students will learn log management, particularly skills for analyzing system related log data. Students will gain an understanding of log analysis tools and technologies available for system administrators through hands-on lab work.
Course includes the following takeaway items: a printed training book and a CD that includes reference materials pertaining to the course.
NICE Work Roles
Responsible for setting up and maintaining a system or specific components of a system (e.g. for example, installing, configuring, and updating hardware and software; establishing and managing user accounts; overseeing or conducting backup and recovery tasks; implementing operational and technical security controls; and adhering to organizational security policies and procedures).
Information Systems Security Manager
Responsible for the cybersecurity of a program, organization, system, or enclave.
Cyber Defense Analyst
Uses data collected from a variety of cyber defense tools (e.g., IDS alerts, firewalls, network traffic logs) to analyze events that occur within their environments for the purposes of mitigating threats.
- Module 1 – Introduction
- Module 2 – Basics of Computer Security Logs
- Module 3 – Log Management Planning
- Module 4 – Log Management Infrastructure
- Module 5 – Log Management Operational Process
- Module 6 – Collection, Analysis, & Retention
- Module 7 – Logs as Digital Evidence
- Module 8 – Capstone
- Module 9 – Final Recommendations & Review
No image gallery for this course as of yet.
No video for this course as of yet.
Share this course