Email Security
We rely on email as one of our most common methods of communication. In this video, you’ll learn about SPF (Secure Policy Framework), DKIM (Domain Keys Identified Mail), and DMARC (Domain-based Message Authentication, Reporting, and Conformance).
Monitoring Data
A good offense against an attacker is to have a good defense. In this video, you’ll learn about data loss prevention, file integrity monitoring, USB blocking, and more.
Endpoint Security
The endpoint is one of the best vectors for an attacker. In this video, you’ll learn about posture assessments, health checks, EDR (Endpoint Detection and Response), and more.
4.6 – Identity and Access Management
Identity and Access Management
An important aspect of security is to match the right permissions to the right people at the right time. In this video, you’ll learn about IAM (Identity and Access Management), account provisioning, permission assignments, single sign-on, and more.
Access Controls
There are many different ways to provide authorization, rights, and permissions. In this video, you’ll learn about least privilege, access control types, time-of-day restrictions, and more.
Multifactor Authentication
A username and password can be enhanced through the use of multifactor authentication. In this video, you’ll learn about something you know, something you have, something you are, and somewhere you are.
Password Security
There are many ways to increase the security of a password. In this video, you’ll learn about password complexity, password managers, passwordless authentication, and more.
4.7 – Automation and Orchestration
Scripting and Automation
Scripting enables automation, speed, and a more streamlined security posture. In this video, you’ll learn about automation benefits, cases for automation, and scripting consideration.
4.8 – Incident Response
Incident Response
When a security incident occurs, it’s important to properly address the incident. In this video, you’ll learn about preparation, isolation, recovery, and more.
Incident Planning
The incident response process can be refined through the use of event planning. In this video, you’ll learn about tabletop exercises, simulations, root cause analysis, and more.
Digital Forensics
The data collection process is an important part of digital forensics. In this video, you’ll learn about legal hold, chain of custody, event reporting, e-discovery, and more.
4.9 – Security Data Sources
Log Data
Log files can provide a comprehensive record of data flows, firewall dispositions, and many other important data points. In this video, you’ll learn about logs from firewalls, applications, endpoints, operating systems, and more.