Did you know Cybrary's video training is FREE? Join more than 2,500,000 IT and cyber security professionals, students, career changers, and more, growing their careers on Cybrary.
This lesson covers monitoring. Upon completion on this chapter, participants will be able to manage, control and document changes to an information system and its environment of operation as well as implementation of the correct forms of patches when the situation requires a patch. In addition, participants will be able to select or support the selection of the appropriate requirements and state the characteristics of good performance measures and choose accordingly. Finally, participants will be able to report of react to the vulnerabilities and mitigations, decommission an information system in the most efficient of the four methods based on the type of information captured, process or stored by the information system. The goal is continuous monitoring.