Evaluating Your Organization’s Security Posture
via Pluralsight
Overview
This course will teach you about completing a holistic security evaluation, and how to shape it into a repeatable practice that helps raise the IT security posture for the whole company.
Assessing your organization’s security is a long process consisting of many moving parts. In this course, Evaluating Your Organization’s Security Posture, you will gain the ability to complete an end-to-end security evaluation to provide a “map” of your company’s security posture. First, you will learn about the practices of security evaluation. Next, you will discover the many tools and techniques available. Finally, you will explore how to effectively juggle the amount of work, evidence, and data collection required of an assessment. When you’re finished with this course, you will have the skills and knowledge of auditing, governance, and critical thinking needed to evaluate your organization’s security.
Topics:
Assessing your organization’s security is a long process consisting of many moving parts. In this course, Evaluating Your Organization’s Security Posture, you will gain the ability to complete an end-to-end security evaluation to provide a “map” of your company’s security posture. First, you will learn about the practices of security evaluation. Next, you will discover the many tools and techniques available. Finally, you will explore how to effectively juggle the amount of work, evidence, and data collection required of an assessment. When you’re finished with this course, you will have the skills and knowledge of auditing, governance, and critical thinking needed to evaluate your organization’s security.
Topics:
- Course Overview
- The Case for Evaluating Your Organization’s Security
- Planning and Organizing the Evaluation
- Collecting Data and Conducting Interviews
- Evaluating Your Organization’s Physical Security
- Evaluating the External Footprint
- Evaluating the Internal IT Security Posture
- Evaluating the Weakest Link - Social Engineering
- Setting the Benchmark and the Concept of Iterative Evaluations
- Wrapping the Security Evaluation
Taught by
Paul Mealus
Related Courses
-
Azure for DevOps: Designing a Strategy
-
Azure for DevOps: Implementing Development Processes
-
Microsoft Azure Security Engineer: Monitor Security Using Azure Security Center
-
Microsoft Azure Security Engineer: Configure Security for Databases
-
Microsoft Azure Security Engineer: Configure Security for Storage
-
Microsoft Azure Security Engineer: Configure Security Policies