Email Security

We rely on email as one of our most common methods of communication. In this video, you’ll learn about SPF (Secure Policy Framework), DKIM (Domain Keys Identified Mail), and DMARC (Domain-based Message Authentication, Reporting, and Conformance).

Monitoring Data

A good offense against an attacker is to have a good defense. In this video, you’ll learn about data loss prevention, file integrity monitoring, USB blocking, and more.

Endpoint Security

The endpoint is one of the best vectors for an attacker. In this video, you’ll learn about posture assessments, health checks, EDR (Endpoint Detection and Response), and more.

4.6 – Identity and Access Management

Identity and Access Management

An important aspect of security is to match the right permissions to the right people at the right time. In this video, you’ll learn about IAM (Identity and Access Management), account provisioning, permission assignments, single sign-on, and more.

Access Controls

There are many different ways to provide authorization, rights, and permissions. In this video, you’ll learn about least privilege, access control types, time-of-day restrictions, and more.

Multifactor Authentication

A username and password can be enhanced through the use of multifactor authentication. In this video, you’ll learn about something you know, something you have, something you are, and somewhere you are.

Password Security

There are many ways to increase the security of a password. In this video, you’ll learn about password complexity, password managers, passwordless authentication, and more.

4.7 – Automation and Orchestration

Scripting and Automation

Scripting enables automation, speed, and a more streamlined security posture. In this video, you’ll learn about automation benefits, cases for automation, and scripting consideration.

4.8 – Incident Response

Incident Response

When a security incident occurs, it’s important to properly address the incident. In this video, you’ll learn about preparation, isolation, recovery, and more.

Incident Planning

The incident response process can be refined through the use of event planning. In this video, you’ll learn about tabletop exercises, simulations, root cause analysis, and more.

Digital Forensics

The data collection process is an important part of digital forensics. In this video, you’ll learn about legal hold, chain of custody, event reporting, e-discovery, and more.

4.9 – Security Data Sources

Log Data 

Log files can provide a comprehensive record of data flows, firewall dispositions, and many other important data points. In this video, you’ll learn about logs from firewalls, applications, endpoints, operating systems, and more.