Understand security operations frameworks, processes, and procedures
Design a logging and auditing security strategy
Develop security operations for hybrid and multi-cloud environments
Design a strategy for Security Information and Event Management (SIEM) and Security Orchestration
Evaluate security workflows
Review security strategies for incident management
Evaluate security operations strategy for sharing technical threat intelligence
Monitor sources for insights on threats and mitigations
After completing this module, students will be able to:
Design a logging and auditing security strategy.
Develop security operations for hybrid and multi-cloud environments.
Design a strategy for Security Information and Event Management (SIEM) and Security Orchestration, A.
Evaluate security workflows.
Review security strategies for incident management.
Evaluate security operations for technical threat intelligence.
Monitor sources for insights on threats and mitigations.