Free Course:
Security Operations
Be the first to access this course, links to created videos are down below. This course is in the process of being released.
Course Content
Module 0 – Welcome and Getting Started
Welcome | https://youtu.be/jLA4T9PQoSA | 0:0:49 |
Course Overview | https://youtu.be/e4TWt4cBPEU | 0:10:30 |
Syllabus | N/A | |
Meet Your Instructor | N/A |
Module 1 – Security Program
Module Intro | https://youtu.be/reiqmqa6D_A | 0:01:14 |
Security Operations | https://youtu.be/CH8giGZQuLA | 0:04:30 |
What is a Cybersecurity Program | https://youtu.be/OuIZkeYsPpQ | 0:07:52 |
Security Program Documentation | https://youtu.be/uJbrR746NyE | 0:04:35 |
Policies | https://youtu.be/VBgoePcAcYE | 0:05:57 |
Information Security Policy (ISP) | https://youtu.be/AyvqYjac5hY | 0:02:46 |
Standards | https://youtu.be/NLJ7z10oAC8 | 0:03:29 |
Procedures | https://youtu.be/hZbiMf2ZWY0 | 0:04:42 |
Guidelines | https://youtu.be/6qhCLZPH0rk | 0:02:26 |
Controls | https://youtu.be/bMOHOEC1PrU | 0:03:36 |
Fail-Open vs Fail-Closed | https://youtu.be/3RTOIZVx1mA | 0:06:16 |
Types of Controls | https://youtu.be/X8wBjWxFbr0 | 0:05:16 |
Policies, Standards, Procedures, Guidelines | https://youtu.be/I1PGDHnqVf8 | 0:09:07 |
Cybersecurity Frameworks | https://youtu.be/QlhgY8j4a74 | 0:07:39 |
Monitoring and Revisions | https://youtu.be/VxknoICuLRA | 0:02:38 |
Security Program Governance | https://youtu.be/fxIWDqBGS-Q | 0:07:40 |
Module 2 – Security Operations
Module Intro | https://youtu.be/H3N4aCasjtA | 0:03:56 |
Compliance Management | https://youtu.be/Wzwhy9WRFkI | 0:01:56 |
Risk Management | https://youtu.be/6g6VcqPRqL8 | 0:05:13 |
Asset Acquisition and Management | https://youtu.be/5w-dreWicEU | 0:02:33 |
Vulnerability Management | https://youtu.be/Fg6XTelPKG4 | 0:06:09 |
Patch Management | https://youtu.be/wBijFzSeirU | 0:02:59 |
Data Management | https://youtu.be/z8QbvQ8hKa0 | 0:01:11 |
Vendor and Supply Chain Management | https://youtu.be/9NdDX-eBjBM | 0:05:08 |
Personnel Management | https://youtu.be/rp18sO3UwMo | 0:02:30 |
Identity and Access Management (IAM) | https://youtu.be/UXMJfmIyIRk | 0:01:05 |
Security Awareness & Training Management | https://youtu.be/jF2ekqGLkuk | 0:01:59 |
Configuration and Change Management | https://youtu.be/LIoUTD0W4_8 | 0:04:06 |
Monitoring and Alerting | https://youtu.be/SlZ18dg7YoM | 0:03:17 |
Incident Management | https://youtu.be/ElsSqnAeleI | 0:02:37 |
Contingency Planning | https://youtu.be/Pu3zBK0SH6E | 0:02:18 |
Auditing and Assessments | https://youtu.be/Dre8uA_gHus | 0:02:03 |
Program Management | https://youtu.be/LBPI66WGWlo | 0:01:22 |
Module 3 – Compliance Management
Module Intro | https://youtu.be/0xvXjlNA0CE | 0:02:27 |
Compliance Management | https://youtu.be/g4BCD_n8FDI | 0:05:15 |
Privacy | https://youtu.be/wx-Q2qrtexM | 0:09:16 |
Data Roles | https://youtu.be/IpTRSb15G5E | 0:04:08 |
Compliance Factors | https://youtu.be/-PaDQ0c9sKg | 0:09:35 |
Regulation, Accreditations, and Standards | https://youtu.be/PdWU6ZckqmQ | 0:04:23 |
Customer, Vendor, and Partner Agreements | https://youtu.be/IZhGJgcWFxE | 0:04:09 |
Legal Actions | https://youtu.be/uI2l6LbCX7U | 0:07:46 |
Compliance Monitoring and Reporting | https://youtu.be/h76Z63_TGRo | 0:10:04 |
Gap Analysis | https://youtu.be/0g_f_cAop1U | 0:04:01 |
Consequences of Non-Compliance | https://youtu.be/PKsYh4t2IUM | 0:02:20 |
Module 4 – Risk Management
Module Intro | https://youtu.be/-LNC8ljRSpE | 0:02:24 |
Risk Management | https://youtu.be/b3muOmLdZ3o | 0:12:55 |
Risk Management Approach | https://youtu.be/4Omv3ClgZgI | 0:07:15 |
Risk Assessment | https://youtu.be/VPcSsrBNXkU | 0:02:52 |
Risk Appetite, Risk Threshold, and Risk Tolerance | https://youtu.be/zGDiMQaXy8I | 0:10:22 |
Risk Identification | https://youtu.be/0DJCuhpWvxc | 0:04:39 |
DEMO: Assessments | https://youtu.be/XrMXPUeWwjw | 0:04:39 |
Risk Tracking & Risk Register | https://youtu.be/c-W8V4g1FD8 | 0:02:27 |
Risk Analysis | https://youtu.be/xN3a0eEVKdk | 0:06:01 |
Qualitative Risk Analysis | https://youtu.be/2vX1Ui3-jC0 | 0:06:01 |
DEMO: Risk Register and Analysis | https://youtu.be/lUzqiEFJ-9c | 0:03:16 |
Asset Value (AV) and Total Cost of Ownership (TCO) | https://youtu.be/h8MQ4MJNAeg | 0:06:23 |
Quantitative Risk Analysis | https://youtu.be/BxWV2BoA70s | 0:05:25 |
Single-Loss Expectancy (SLE) and Exposure Factor (EF) | https://youtu.be/G2F3Rvs0AC8 | 0:05:22 |
Annualized Loss Expectancy (ALE) and Annual Rate of Occurrence (ARO) | https://youtu.be/cLD8BKzuBMs | 0:05:22 |
Risk Reporting | https://youtu.be/BL57aFNuTEI | 0:07:14 |
Risk Management Strategies | https://youtu.be/5GfIpGefjJk | 0:05:27 |
Risk Mitigation and Controls | https://youtu.be/HUJezjmZTCI | 0:05:30 |
Inherent and Residual Risk | https://youtu.be/xbW611wJ3qI | 0:01:37 |
Trade-Off Analysis | https://youtu.be/imxybEfWafQ | 0:10:36 |
Cost-Benefit Analysis (CBA) Example | https://youtu.be/HDWdFoCOakI | 0:09:53 |
Calculating Return On Investment (ROI) | https://youtu.be/q4CsfusndQA | 0:09:40 |
DEMO: ROI Worksheet | https://youtu.be/PB5MBLu4GqI | 0:03:39 |
Planning and Prioritization | https://youtu.be/JuJEyGLgxHg | 0:07:14 |
Module 5 – Asset Acquistion and Management
Module Intro | https://youtu.be/TNUanMGeCxQ | 0:02:18 |
Asset Management | https://youtu.be/WCb8_N8v_VA | 0:10:36 |
Acquisition and Procurement | https://youtu.be/Jza1dIYPW9c | 0:07:57 |
Assignment and Accounting | https://youtu.be/JdfXjk_DpHw | 0:02:55 |
Monitoring and Asset tracking | https://youtu.be/fn0S0OFxQ3s | 0:04:45 |
Decommissioning and Disposal | https://youtu.be/4KGsEYJCCWc | 0:07:14 |
Module 6 – Vulnerability and Patch Management
Module Intro | https://youtu.be/ZSWKUFz6BaA | 0:04:42 |
Vulnerability Management | https://youtu.be/y6xKWY-0ADM | 0:13:47 |
Common Vulnerabilities and Exposures (CVE) | https://youtu.be/XZZyRflWIz0 | 0:03:42 |
Common Vulnerability Scoring System (CVSS) | https://youtu.be/0iNg5XpuvF8 | 0:12:09 |
Discovering Vulnerabilities | https://youtu.be/zeN5z3w4p0w | 0:07:24 |
Discovering Application Vulnerabilities | https://youtu.be/VU31jCpp9wA | 0:05:57 |
Vulnerability Scans | https://youtu.be/LEETqqdhlCc | 0:08:11 |
Vulnerability Scanner Settings and Considerations | https://youtu.be/LP3OJC_GLt8 | 0:16:18 |
Penetration Testing (Pentesting) | https://youtu.be/0WAfI3-OVe0 | 0:08:16 |
Red Teams and Blue Teams | https://youtu.be/c8vNcEwWGNM | 0:02:28 |
Reporting | https://youtu.be/VQIySU8h0rQ | 0:03:53 |
Vulnerability Validation | https://youtu.be/yABHFGPtan0 | 0:03:26 |
Vulnerability Analysis and (Re-)Classification | https://youtu.be/xHsRs7FABAU | 0:03:10 |
Prioritization and Escalation | https://youtu.be/R-GF4Gp3jq4 | 0:02:50 |
Action Plan | https://youtu.be/RzE0klvaAjE | 0:06:14 |
Vulnerability Remediation | https://youtu.be/Aka2XvY1b6Q | 0:07:51 |
Validation of Remediation | https://youtu.be/ddhix34M-2M | 0:01:43 |
Patch Management | https://youtu.be/6kOS2dcAFfg | 0:08:41 |
Module 7 – Data Management
Module 8 – Vendor and Supply Chain Management
Module 9 – Personnel Management
Module 10 – Identity and Access Management (IAM)
Module 11 – Security Awareness and Training
Module 12 – Configuration and Change Management
Module 13 – Monitoring and Alerting
Module 14 – Incident Management
Module 15 – Digital Forensics
Module 16 – Contingency Planning
Module 17 – Auditing and Assessment
Module 18 – Program Management
Appendix A – Regulatory Compliance
Appendix B – Agreements
Module X – Wrap Up
Security Operations X-1: Review | https://youtu.be/nffTuFXbeo8 | 0:06:35 |
Course Wrap Up | https://youtu.be/ze1VSTWAH5o |
Help the Effort
Creating these videos takes a lot of time, effort, and money. There are costs to producing the videos, hosting the site, and buying the equipment, not to mention the 1,000’s of hours I’ve put into recording these videos. So far, I’ve asked for and received very little in return. Please consider helping keep the effort going by one of the following:
- Donate to the cause: buymeacoffee.com/techknowsurge
- Buy TechKnowSurge merch: techknowsurge.myspreadshop.com/
- Like and comment on any YouTube videos you watch
- Subscribe to my channel: youtube.com/@TechKnowSurge
- Let me know if there is any issues with my content, just send me an email: feedback@techknowsurge.com
- Purchase a class on Udemy and leave me a review: www.udemy.com/user/techknowsurge/
- Subscribe to the TechKnowSurge newsletter: techknowsurge.com/newsletter-signup/
- Follow me on social media
- Facebook: www.facebook.com/TechKnowSurge
- Twitter: twitter.com/TechKnowSurge
- Instagram: www.instagram.com/techknowsurge
- LinkedIn: www.linkedin.com/company/techknowsurge
- Tell your others about TechKnowSurge
- Share content links to others
- Repost content on social media
- Tell classmates about what videos helped you