New Skills

New Training: Automate Security Operations and Monitoring

by Team Nuggets
New Training: Automate Security Operations and Monitoring picture: A
Follow us
Published on February 23, 2021

In this 7-video skill, CBT Nuggets trainer Jacob Moran teaches you about the Security Content Automation Protocol (SCAP), Continuous Integration (CI), Continuous Delivery or Deployment (CD), and Security Orchestration, Automation, and Response (SOAR). Gain an understanding of the automation tools used by cybersecurity analysts, and learn how to automate malware signature creation. Watch this new CompTIA training.

Watch the full course: CompTIA Cybersecurity Analyst

This training includes:

  • 7 videos

  • 31 minutes of training

You’ll learn these topics in this skill:

  • Introduction to Security Automation Concepts and Technologies

  • Identifying Security Automation Protocols and Standards

  • Identifying Security Workflow Orchestration Concepts

  • Security Automation With Scripting and API Integration

  • Automating Malware Signature Creation

  • Automating Security Intelligence Gains

  • Continuous Integration and Deployment of Security Automation

SCAP: A List of Security Automation Tools for Organizations

Information Security has historically been at odds with business functions. Though businesses do want to ensure their IT systems are safe, the cost and restrictiveness great cybersecurity offers also introduces friction into business processes. This is why businesses follow the Security Content Automation Protocol (SCAP).

SCAP isn't a protocol in the same way that HTTP is. Instead, it is a workflow designed as a checklist for security information operations to follow to ensure analysis of security vulnerabilities. It utilizes industry standard and proven automation tools to analyze and diagnose information security issues.

SCAP is maintained by the community as a whole. There is not a single organization that has control over it. Instead, business leaders and government agencies, like NIST, discuss and provide input for SCAP. That means that SCAP creates a framework that covers the gamut of security issues while working around business use-cases. Because SCAP is built by business leaders and government organizations alike, it offers a great path towards information security with as little friction as possible.


Download

By submitting this form you agree to receive marketing emails from CBT Nuggets and that you have read, understood and are able to consent to our privacy policy.


Don't miss out!Get great content
delivered to your inbox.

By submitting this form you agree to receive marketing emails from CBT Nuggets and that you have read, understood and are able to consent to our privacy policy.

Recommended Articles

Get CBT Nuggets IT training news and resources

I have read and understood the privacy policy and am able to consent to it.

© 2024 CBT Nuggets. All rights reserved.Terms | Privacy Policy | Accessibility | Sitemap | 2850 Crescent Avenue, Eugene, OR 97408 | 541-284-5522