Continuous Monitoring and Security Operations

This course assesses the current state of security architecture and continuous monitoring, and provides a new approach to security architecture that can be easily understood and defended. When students finish, they have a list of action items in hand for making their organization one of the most effective vehicles for frustrating adversaries. Students are able to assess deficiencies in their own organization's security architectures and affect meaningful changes that are continuously monitored for deviations from their expected security posture.

Course syllabus:

  1. Current State Assessment, Security Operation Centers and Security Architecture

  2. Network Security Architecture

  3. Network Security Monitoring

  4. Endpoint Security Architecture

  5. Automation and Continuous Security Monitoring

  6. Capstone: Design, Detect, Defend