New Training: Automate Security Operations and Monitoring
In this 7-video skill, CBT Nuggets trainer Jacob Moran teaches you about the Security Content Automation Protocol (SCAP), Continuous Integration (CI), Continuous Delivery or Deployment (CD), and Security Orchestration, Automation, and Response (SOAR). Gain an understanding of the automation tools used by cybersecurity analysts, and learn how to automate malware signature creation. Watch this new CompTIA training.
Watch the full course: CompTIA Cybersecurity Analyst
This training includes:
- 7 videos
- 31 minutes of training
You’ll learn these topics in this skill:
- Introduction to Security Automation Concepts and Technologies
- Identifying Security Automation Protocols and Standards
- Identifying Security Workflow Orchestration Concepts
- Security Automation With Scripting and API Integration
- Automating Malware Signature Creation
- Automating Security Intelligence Gains
- Continuous Integration and Deployment of Security Automation
SCAP: A List of Security Automation Tools for Organizations
Information Security has historically been at odds with business functions. Though businesses do want to ensure their IT systems are safe, the cost and restrictiveness great cybersecurity offers also introduces friction into business processes. This is why businesses follow the Security Content Automation Protocol (SCAP).
SCAP isn't a protocol in the same way that HTTP is. Instead, it is a workflow designed as a checklist for security information operations to follow to ensure analysis of security vulnerabilities. It utilizes industry standard and proven automation tools to analyze and diagnose information security issues.
SCAP is maintained by the community as a whole. There is not a single organization that has control over it. Instead, business leaders and government agencies, like NIST, discuss and provide input for SCAP. That means that SCAP creates a framework that covers the gamut of security issues while working around business use-cases. Because SCAP is built by business leaders and government organizations alike, it offers a great path towards information security with as little friction as possible.