CISM 2022: Security Monitoring
“Because today s business computing environments can contAIn a dizzying array of device types centralized data ingestion and analysis looking for anomalies is a critical part of defending against technological threats.
In this course you will begin by reviewing Microsoft Defender for Cloud security recommendations in the Microsoft Azure cloud and monitoring the performance of Windows hosts. Then you will review search and filter Windows Event Viewer logs configure Windows log forwarding to a second Windows host and monitor the performance of a Linux host. Next you will view various Linux logs enable Linux log forwarding using syslog-ng review web server logs and monitor the performance of cloud services. Finally you will learn how to decipher threat positives and negatives how security information and event management (SIEM) and security orchestration automation and response (SOAR) can detect and remediate security incidents and how to configure the Microsoft Sentinel SIEM.
This course can be used to prepare for the Certified Information Security Manager (CISM) exam.”