Why You Should Take AUD507: Auditing & Monitoring Networks, Perimeters & Systems

Subscribers:
64,000
Published on ● Video Link: https://www.youtube.com/watch?v=3KGTCHRBS3c



Duration: 1:53
697 views
5


Course author David Hoelzer explains what makes AUD507: Auditing & Monitoring Networks, Perimeters & Systems such a great course.

In AUD507 you will learn:

- Understand the different types of controls (e.g., technical vs. non-technical) essential to performing a successful audit

- Conduct a proper risk assessment of network to identify vulnerabilities and prioritize what will be audited

- Establish a well-secured baseline for computers and networks, a standard to conduct audit against

- Perform a network and perimeter audit using a seven step process

- Audit firewalls to validate that rules/settings are working as designed, blocking traffic as required

- Utilize vulnerability assessment tools effectively to provide management with the continuous remediation information necessary to make informed deci- sions about risk and resources.

- Audit web application's configuration, authentication, and session management identify vulnerabilities attackers can exploit

- Utilize scripting to build a system to baseline and automatically audit Active Directory and all systems in a Windows domain

David Hoelzer is the author of more than twenty days of SANS courseware. He is an expert in a variety of information security fields, having served in most major roles in the IT and security industries over the past twenty-five years.




Other Videos By SANS Institute


2019-07-30Network Flow Data: A Cornucopia of Value - SANS Blue Team Summit
2019-07-24Scanners, Tunnels, and Sims, Oh My! - SANS ICS Security Summit 2019
2019-07-23Zero-Trust Networks: The Future Is Here - SANS Blue Team Summit 2019
2019-07-22Threat Hunting via Sysmon - SANS Blue Team Summit
2019-07-17Creating a Security Metrics Program: How to Measure Success - SANS ICS Security Summit 2019
2019-07-15To Blue with ATT&CK-Flavored Love - SANS Blue Team Summit
2019-07-12OSINT: Not Just Offensive - SANS Blue Team Summit
2019-07-01Defeating Attackers with Preventative Security
2019-06-13Why You Should Take SEC560: Network Penetration Testing and Ethical Hacking
2019-06-13Why You Should Take SEC660: Advanced Penetration Testing, Exploit Writing, and Ethical Hacking
2019-06-13Why You Should Take AUD507: Auditing & Monitoring Networks, Perimeters & Systems
2019-06-13Why You Should Take SEC504: Hacker Tools, Techniques, Exploits, and Incident Handling
2019-06-13Key Take-Aways from SEC401: Security Essentials Bootcamp Style
2019-06-13Key Take-Aways from SEC503: Intrusion Detection In-Depth
2019-06-10What Do You Need To Know About SANS SEC760: Advanced Exploit Development for Penetration Testers?
2019-05-28Not Giving Credit Where Credit is Due - Common Cybersecurity Writing Mistakes
2019-05-27Including Details Most Readers Don’t Read - Common Cybersecurity Writing Mistakes
2019-05-24Escalating Tensions in Difficult Situations - Common Cybersecurity Writing Mistakes
2019-05-23Using FUD to Cause Anxiety - Common Cybersecurity Writing Mistakes
2019-05-22Not Using Parallel Structure - Common Cybersecurity Writing Mistakes
2019-05-21Using More Words Than Necessary - Common Cybersecurity Writing Mistakes



Tags:
SANS AUD507
David Hoelzer
SANS Institute
Continuous Monitoring
Audit Techniques
Network Auditing
Web Application Auditing
Vulnerability Assessments