This lesson covers:
What security auditing and analysis are
How to define your audit plan
What auditing benchmarks are
How to collect audit data
Which post-audit activities you need to perform
How to perform security monitoring
Which typed of log information you should capture
How to verify security controls
How to monitor and test your security systems
If you enjoyed this video please subscribe for more great training.
If you are preparing for your IT security certifications Prof. Smith offers live, online and self study courses. Learn more at https://cautelacyber.com/courses
Check out my 14,000 member plus Cybersecurity Facebook group – https://www.facebook.com/groups/getci…
Connect with me of LinkedIn – https://www.linkedin.com/in/dsmith8952/
Learn about cybersecurity on my Cybersecurity Hot Topics Blog – https://cybersecurityhottopics.com/
Follow me on twitter – https://twitter.com/DerekASmith1
Follow me on Facebook – https://www.facebook.com/derekasmith53/