Secure Business Systems Administration Overview

Video Activity
Join over 3 million cybersecurity professionals advancing their career
Sign up with
or

Already have an account? Sign In »

Time
2 hours 13 minutes
Difficulty
Beginner
CEU/CPE
2
Video Transcription
00:05
all right.
00:06
No
00:09
welcome to the puzzle. Out to networks Cyber Security Academy Secure Business Systems Administration Course
00:17
In this SBS Administration course, you will evaluate the challenges associated with the business cybersecurity landscape and examine how to minimize risks and reduce a business attack surface.
00:34
This course is a primer for anyone who interacts with securing business systems from day to day stakeholders and administrators through to management and sea level decision makers.
00:48
The SPS administration course Learning path progresses from evaluating common threats and attack processes through to analyzing security policy, best practices and learning how to improve the businesses security posture and to protect critical business functions.
01:08
To achieve these objectives, with course focuses on four domains.
01:14
Identifying cyber threats, analyzing business cybercrimes and challenges, establishing business security policies and understanding the cyberattack life cycle.
01:26
So let's take a closer look at each of the warning topics that are the focus of each of these domains.
01:34
For the cyber threat identification warning module students discover details regarding the current threat. Climate and landscape
01:42
learning resource is provide overviews for the topics of malware and threat agents and also detail threat. Actors can exploit vulnerabilities found in WiFi networking services via Advanced persistent threats or AP cheese.
02:00
The Business Cybercrimes and Challenges module examines cyber criminal events and threats, specifically identifying the cybersecurity business challenges that are associated with remote employees.
02:16
The Business Security Policy warning module discusses management tools and responses to the previously defined cybersecurity challenges, specifically looking at cyber employees. Security challenges
02:30
Different policy types were introduced, as well as the concepts of policy, management, enforcement and response.
02:39
The cyberattack lifecycle module presents a larger picture of the attacker mindsets and methodologies
02:46
and also looks at how to respond in mitigate a cyber attack and to restore business operations to proper working order.
02:57
So this administration course also introduces enterprise, cloud and future facing cybersecurity, defense tools and services through an introduction of Palo Alto networks, strata, prisma and cortex applications
03:14
and a recurring theme that you'll want to revisit throughout your administration. Course mourning process as well as in the workplace, is that cybersecurity is a core responsibility for all employees in the organisation,
03:27
from sea level decision makers all the way through to the day to day operations personnel.
03:32
Effective cybersecurity needs to be practiced via consistent and dedicated enterprise wide efforts.
03:42
So from the Palo Alto Networks Economy team, we wish you a wonderful course
Up Next