Pluralsight – Auditing Windows Server 2016 for Security and Practices

Pluralsight – Auditing Windows Server 2016 for Security and Practices
English | Size: 281.10 MB
Category: CBTs

Knowing how to set up auditing for Windows Server 2016 is an effective way to protect your company from downtime and security threats. In this course, you’ll learn how to set up auditing for users, objects, and the server itself.
[Read more…]

SANS SEC566 Implementing and Auditing the Critical Security Controls In-Depth (PDF 2016)

SANS SEC566 Implementing and Auditing the Critical Security Controls In-Depth (PDF 2016)
English | Size: 165.79 MB
Category: E-learning | Networking | Security

Cybersecurity attacks are increasing and evolving so rapidly that it is more difficult than ever to prevent and defend against them. Does your organization have an effective method in place to detect, thwart, and monitor external and internal threats to prevent security breaches? This course helps you master specific, proven techniques and tools needed to implement and audit the Critical Security Controls as documented by the Center for Internet Security (CIS).
[Read more…]

SANS SEC566 Implementing and Auditing the Critical Security Controls – In-Depth (2016)

SANS SEC566: Implementing and Auditing the Critical Security Controls – In-Depth (2016)
English | Size: 165.79 MB
Category: Tutorial

SANS’ in-depth, hands-on training will teach you how to master the specific techniques and tools needed to implement and audit the Critical Controls. It will help security practitioners understand not only how to stop a threat, but why the threat exists, and how to ensure that security measures deployed today will be effective against the next generation of threats. [Read more…]

SANS AUD507 Auditing & Monitoring Networks, Perimeters & Systems (2016) PDFs

SANS AUD507: Auditing & Monitoring Networks, Perimeters & Systems (2016) PDFs
English | Size: 214.96 MB
Category: Network

One of the struggles that IT auditors face today is assisting management to understand the relationship between the technical controls and the risks to the business that these affect. In this course these threats and vulnerabilities are explained based on validated information from real world situations. The instructor will take the time to explain how this can be used to raise the awareness of management and others within the organization to build an understanding of why these controls specifically and auditing in general is important.
[Read more…]

SANS AUD507 Auditing & Monitoring Networks Perimeters & Systems (PDF 2016)

SANS AUD507 Auditing & Monitoring Networks Perimeters & Systems (PDF 2016)
English | Size: 214.96 MB
Category: E-learning | Networking | Security

One of the most significant obstacles facing many auditors today is how exactly to go about auditing the security of an enterprise. What systems really matter? How should the firewall and routers be configured? What settings should be checked on the various systems under scrutiny? Is there a set of processes that can be put into place to allow an auditor to focus on the business processes rather than the security settings? How do we turn this into a continuous monitoring process? All of these questions and more will be answered by the material covered in this course. [Read more…]

Auditing Windows Server 2016 for Security and Practices

Auditing Windows Server 2016 for Security and Practices
English | Size: 280.56 MB
Category: HACKING | Microsoft | Security

Knowing how to set up auditing for Windows Server 2016 is an effective way to protect your company from downtime and security threats. In this course, you’ll learn how to set up auditing for users, objects, and the server itself.
Good auditing practices are essential to ensure a server is kept secure and reliable. In this course, Auditing Windows Server 2016 for Security and Practices, you’ll be guided through the advanced auditing settings in Windows Server 2016. First, you’ll learn how to keep track of information about how users are signing into systems. Next, you’ll discover how and when objects on a system are accessed. Finally, you’ll explore how to know when a critical change occurred in a system. When you’re finished with this course, you’ll have the knowledge needed to properly set up auditing in your Windows Server 2016 environment and prevent a threat to your company’s security and productivity. Software required: Windows Server 2016. [Read more…]

Auditing Windows Server 2016 for Security and Practices

Auditing Windows Server 2016 for Security and Practices
English | Size: 280.56 MB
Category: HACKING | Microsoft | Security

Knowing how to set up auditing for Windows Server 2016 is an effective way to protect your company from downtime and security threats. In this course, you’ll learn how to set up auditing for users, objects, and the server itself.
Good auditing practices are essential to ensure a server is kept secure and reliable. In this course, Auditing Windows Server 2016 for Security and Practices, you’ll be guided through the advanced auditing settings in Windows Server 2016. First, you’ll learn how to keep track of information about how users are signing into systems. Next, you’ll discover how and when objects on a system are accessed. Finally, you’ll explore how to know when a critical change occurred in a system. When you’re finished with this course, you’ll have the knowledge needed to properly set up auditing in your Windows Server 2016 environment and prevent a threat to your company’s security and productivity. Software required: Windows Server 2016. [Read more…]

Lynda – CISA Cert Prep – 1 Auditing Information Systems for IS Auditors

Lynda – CISA Cert Prep – 1 Auditing Information Systems for IS Auditors
English | Size: 148.45 MB
Category: Tutorial

Earning a CISA certification validates your ability to audit, control, and monitor information systems. The CISA Cert Prep series prepares you to tackle this exam by going into each of the topics it covers, helping you acquire the skills you need to confidently manage IT security audits. In this course-the first in the series-take a deep dive into the concepts covered in the Process of Auditing Information Systems domain. Learn how to organize and plan an audit, put controls in place, and use a repeatable audit process to ensure that your results are meaningful and your audit is complete. Plus, learn about communicating results with an audit outbrief, embedding the audit function into operations, and how continuous auditing can help you identify and fix problems more effectively. [Read more…]

Pluralsight – Auditing AWS Environments for Security and Best Practices by Chad Smith

Pluralsight – Auditing AWS Environments for Security and Best Practices by Chad Smith
English | Size: 215.45 MB
Category: Tutorial

AWS is the most popular cloud hosting infrastructure in the world. This course will cover security and best practices for the most commonly used services, including IAM, VPC, EC2, EBS, and S3.

Taking ownership of an Amazon Web Services account can be a daunting task. In this course, Auditing AWS for Security and Best Practices, you’ll learn how to audit your AWS services, including command-line tools and scripts to help automate your effort. First, you will learn how to look for security vulnerabilities. Next, you’ll learn how to take an inventory of your resources. Finally, you’ll learn about best practices for these services and how to apply them. When you’re finished with this course, you will have learned the basics needed to implement security and architectural best practices in five of the most popular AWS offerings: IAM, VPC, EC2, EBS, and S3. Software required: AWS CLI [Read more…]

Pluralsight – Information Systems Auditing The Big Picture

Pluralsight – Information Systems Auditing The Big Picture
English | Size: 121.10 MB
Category: Tutorial

This course will provide you with an excellent overview of the process and benefits of Information Systems Auditing.

Information technology is a critical component of business operations today. Nearly every part of the business relies on technology and networks in order to operate. This means that the IT audit function is important. In this course, Information Systems Auditing: The Big Picture, you’ll learn the value of audit from the perspective of either the auditor or the auditee that is subject of the audit. [Read more…]