Category Archives: Uncategorized
1. Construct KQL statements for Microsoft Sentinel Everyone and welcome back to my course, Security Operations Analyst SC 200. We are beginning a new section, and in this section we are going to focus on the Crystal Query Language queries for Microsoft Sentinel. Now, these are the lessons that we’ll have in this section. In […]
1. Plan for cloud workload protections using Microsoft Defender for Cloud Everyone and welcome back to my course, Security Operations Analyst SC 200. Now we are starting a new section in which we are going to discuss mitigating threats using yet another tool from the Microsoft Security Stack, and that is Microsoft Defender for Cloud. […]
1. Business Continuity and Disaster Recovery We spent a very long, very well spent, and worthwhile amount of time on networking concepts and networking vulnerabilities. We talked about OSI, wireless, Bluetooth, network devices, network security, and protocol. Of course, networking is all about data. So let’s talk about managing data, whether it’s on a network […]
19. Firewalls We’ve talked about VoIP; let’s talk a little bit more about intrusion detection. We know that intrusion detection is basically surveillance cameras on your network, but it can be more than that. There are many, many intrusion detection tools. Some are free, some are paid, and some are highly sophisticated. The whole idea […]
13. Environmental Security Something that goes hand in hand with physical security is environmental security. And lots of folks don’t really think about that so much. But when you’re looking at security, you’re not just looking at locked doors. You’re also looking at how good the environment is. Is it too dusty? Is it too […]
10. Access Controls When we’re trying to control people’s access, we’ve already talked about how we want them to identify themselves, and then we want to authenticate people. Identification and authentication are similar but not necessarily the same. We talked about earlier how identification can also be identification. So you can either walk into a […]
7. Asymmetric Encryption We know about symmetric key encryption, where you use the same passphrase, the same password, and the same key to both encrypt and decrypt. Let’s talk about asymmetry. The whole problem of the symmetric key and the risk of compromising the key was intriguing problem. And there was a mathematician at MIT […]
4. Types of Attacks Let’s talk a little bit about the types of attacks. Not all attacks are computer attacks. There are numerous human attacks. It’s very, very common to get a phone call. Oh, this is the help desk, and we’re going to be changing our database server around a little bit. and I’m […]
1. I S Auditor Technical Overview In this lesson, we’re going to talk about all of the technical things you need to know to be an IS auditor. Now, while it would be ideal if you had a Microsoft MCP network plus certification, maybe a Cisco CCNA, to have that technical background, we will cover […]
9. Incident Management Now let’s talk about incident management. When something happens, how do we deal with incidents? And we can see here that an incident is an unplanned interruption to our process or our service, or it’s a reduction in quality. And incidents are caused by problems. And you can have multiple incidents from […]