Free Course:

Security Operations

Be the first to access this course, links to created videos are down below. This course is in the process of being released.

Course Content

Module 0 – Welcome and Getting Started

Welcome https://youtu.be/jLA4T9PQoSA 0:0:49
Course Overview https://youtu.be/e4TWt4cBPEU 0:10:30
Syllabus N/A
Meet Your Instructor N/A

 

Module 1 – Security Program

Module Intro https://youtu.be/reiqmqa6D_A 0:01:14
Security Operations https://youtu.be/CH8giGZQuLA 0:04:30
What is a Cybersecurity Program https://youtu.be/OuIZkeYsPpQ 0:07:52
Security Program Documentation https://youtu.be/uJbrR746NyE 0:04:35
Policies https://youtu.be/VBgoePcAcYE 0:05:57
Information Security Policy (ISP) https://youtu.be/AyvqYjac5hY 0:02:46
Standards https://youtu.be/NLJ7z10oAC8 0:03:29
Procedures https://youtu.be/hZbiMf2ZWY0 0:04:42
Guidelines https://youtu.be/6qhCLZPH0rk 0:02:26
Controls https://youtu.be/bMOHOEC1PrU 0:03:36
Fail-Open vs Fail-Closed https://youtu.be/3RTOIZVx1mA 0:06:16
Types of Controls https://youtu.be/X8wBjWxFbr0 0:05:16
Policies, Standards, Procedures, Guidelines https://youtu.be/I1PGDHnqVf8 0:09:07
Cybersecurity Frameworks https://youtu.be/QlhgY8j4a74 0:07:39
Monitoring and Revisions https://youtu.be/VxknoICuLRA 0:02:38
Security Program Governance https://youtu.be/fxIWDqBGS-Q 0:07:40

 

Module 2 – Security Operations

Module Intro https://youtu.be/H3N4aCasjtA 0:03:56
Compliance Management https://youtu.be/Wzwhy9WRFkI 0:01:56
Risk Management https://youtu.be/6g6VcqPRqL8 0:05:13
Asset Acquisition and Management https://youtu.be/5w-dreWicEU 0:02:33
Vulnerability Management https://youtu.be/Fg6XTelPKG4 0:06:09
Patch Management https://youtu.be/wBijFzSeirU 0:02:59
Data Management https://youtu.be/z8QbvQ8hKa0 0:01:11
Vendor and Supply Chain Management https://youtu.be/9NdDX-eBjBM 0:05:08
Personnel Management https://youtu.be/rp18sO3UwMo 0:02:30
Identity and Access Management (IAM) https://youtu.be/UXMJfmIyIRk 0:01:05
Security Awareness & Training Management https://youtu.be/jF2ekqGLkuk 0:01:59
Configuration and Change Management https://youtu.be/LIoUTD0W4_8 0:04:06
Monitoring and Alerting https://youtu.be/SlZ18dg7YoM 0:03:17
Incident Management https://youtu.be/ElsSqnAeleI 0:02:37
Contingency Planning https://youtu.be/Pu3zBK0SH6E 0:02:18
Auditing and Assessments https://youtu.be/Dre8uA_gHus 0:02:03
Program Management https://youtu.be/LBPI66WGWlo 0:01:22

 

Module 3 – Compliance Management

Module Intro https://youtu.be/0xvXjlNA0CE 0:02:27
Compliance Management https://youtu.be/g4BCD_n8FDI 0:05:15
Privacy https://youtu.be/wx-Q2qrtexM 0:09:16
Data Roles https://youtu.be/IpTRSb15G5E 0:04:08
Compliance Factors https://youtu.be/-PaDQ0c9sKg 0:09:35
Regulation, Accreditations, and Standards https://youtu.be/PdWU6ZckqmQ 0:04:23
Customer, Vendor, and Partner Agreements https://youtu.be/IZhGJgcWFxE 0:04:09
Legal Actions https://youtu.be/uI2l6LbCX7U 0:07:46
Compliance Monitoring and Reporting https://youtu.be/h76Z63_TGRo 0:10:04
Gap Analysis https://youtu.be/0g_f_cAop1U 0:04:01
Consequences of Non-Compliance https://youtu.be/PKsYh4t2IUM 0:02:20

 

Module 4 – Risk Management

Module Intro https://youtu.be/-LNC8ljRSpE 0:02:24
Risk Management https://youtu.be/b3muOmLdZ3o 0:12:55
Risk Management Approach https://youtu.be/4Omv3ClgZgI 0:07:15
Risk Assessment https://youtu.be/VPcSsrBNXkU 0:02:52
Risk Appetite, Risk Threshold, and Risk Tolerance https://youtu.be/zGDiMQaXy8I 0:10:22
Risk Identification https://youtu.be/0DJCuhpWvxc 0:04:39
DEMO: Assessments https://youtu.be/XrMXPUeWwjw 0:04:39
Risk Tracking & Risk Register https://youtu.be/c-W8V4g1FD8 0:02:27
Risk Analysis https://youtu.be/xN3a0eEVKdk 0:06:01
Qualitative Risk Analysis https://youtu.be/2vX1Ui3-jC0 0:06:01
DEMO: Risk Register and Analysis https://youtu.be/lUzqiEFJ-9c 0:03:16
Asset Value (AV) and Total Cost of Ownership (TCO) https://youtu.be/h8MQ4MJNAeg 0:06:23
Quantitative Risk Analysis https://youtu.be/BxWV2BoA70s 0:05:25
Single-Loss Expectancy (SLE) and Exposure Factor (EF) https://youtu.be/G2F3Rvs0AC8 0:05:22
Annualized Loss Expectancy (ALE) and Annual Rate of Occurrence (ARO) https://youtu.be/cLD8BKzuBMs 0:05:22
Risk Reporting https://youtu.be/BL57aFNuTEI 0:07:14
Risk Management Strategies https://youtu.be/5GfIpGefjJk 0:05:27
Risk Mitigation and Controls https://youtu.be/HUJezjmZTCI 0:05:30
Inherent and Residual Risk https://youtu.be/xbW611wJ3qI 0:01:37
Trade-Off Analysis https://youtu.be/imxybEfWafQ 0:10:36
Cost-Benefit Analysis (CBA) Example https://youtu.be/HDWdFoCOakI 0:09:53
Calculating Return On Investment (ROI) https://youtu.be/q4CsfusndQA 0:09:40
DEMO: ROI Worksheet https://youtu.be/PB5MBLu4GqI 0:03:39
Planning and Prioritization https://youtu.be/JuJEyGLgxHg 0:07:14

 

Module 5 – Asset Acquistion and Management

Module Intro https://youtu.be/TNUanMGeCxQ 0:02:18
Asset Management https://youtu.be/WCb8_N8v_VA 0:10:36
Acquisition and Procurement https://youtu.be/Jza1dIYPW9c 0:07:57
Assignment and Accounting https://youtu.be/JdfXjk_DpHw 0:02:55
Monitoring and Asset tracking https://youtu.be/fn0S0OFxQ3s 0:04:45
Decommissioning and Disposal https://youtu.be/4KGsEYJCCWc 0:07:14

 

Module 6 – Vulnerability and Patch Management

Module Intro https://youtu.be/ZSWKUFz6BaA 0:04:42
Vulnerability Management https://youtu.be/y6xKWY-0ADM 0:13:47
Common Vulnerabilities and Exposures (CVE) https://youtu.be/XZZyRflWIz0 0:03:42
Common Vulnerability Scoring System (CVSS) https://youtu.be/0iNg5XpuvF8 0:12:09
Discovering Vulnerabilities https://youtu.be/zeN5z3w4p0w 0:07:24
Discovering Application Vulnerabilities https://youtu.be/VU31jCpp9wA 0:05:57
Vulnerability Scans https://youtu.be/LEETqqdhlCc 0:08:11
Vulnerability Scanner Settings and Considerations https://youtu.be/LP3OJC_GLt8 0:16:18
Penetration Testing (Pentesting) https://youtu.be/0WAfI3-OVe0 0:08:16
Red Teams and Blue Teams https://youtu.be/c8vNcEwWGNM 0:02:28
Reporting https://youtu.be/VQIySU8h0rQ 0:03:53
Vulnerability Validation https://youtu.be/yABHFGPtan0 0:03:26
Vulnerability Analysis and (Re-)Classification https://youtu.be/xHsRs7FABAU 0:03:10
Prioritization and Escalation https://youtu.be/R-GF4Gp3jq4 0:02:50
Action Plan https://youtu.be/RzE0klvaAjE 0:06:14
Vulnerability Remediation https://youtu.be/Aka2XvY1b6Q 0:07:51
Validation of Remediation https://youtu.be/ddhix34M-2M 0:01:43
Patch Management https://youtu.be/6kOS2dcAFfg 0:08:41

 

Module 7 – Data Management

 

Module 8 – Vendor and Supply Chain Management

 

Module 9 – Personnel Management

 

Module 10 – Identity and Access Management (IAM)

 

Module 11 – Security Awareness and Training

 

Module 12 – Configuration and Change Management

 

Module 13 – Monitoring and Alerting

 

Module 14 – Incident Management

 

Module 15 – Digital Forensics

 

Module 16 – Contingency Planning

 

Module 17 – Auditing and Assessment

 

Module 18 – Program Management

 

Appendix A – Regulatory Compliance

 

Appendix B – Agreements

 

Module X – Wrap Up

Security Operations X-1: Review https://youtu.be/nffTuFXbeo8 0:06:35
Course Wrap Up https://youtu.be/ze1VSTWAH5o

 

Help the Effort

Creating these videos takes a lot of time, effort, and money. There are costs to producing the videos, hosting the site, and buying the equipment, not to mention the 1,000’s of hours I’ve put into recording these videos. So far, I’ve asked for and received very little in return. Please consider helping keep the effort going by one of the following: