Modern Security Operations
Offered By: Google Cloud via Coursera
Course Description
Overview
Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Modern Security Operations, based on Google's Autonomic Security Operations framework and Continuous Detection, Continuous Response (CD/CR) methodology is a combination of philosophies, practices, and tools that improve an organization's ability to withstand security attacks through an adaptive, agile, and highly automated approach to threat management. In this introductory course, learners will gain a holistic perspective on leading their organizations through modernizing their security operations program.
Syllabus
- Module 1: Introduction
- Introduction to the course, overall learning objectives, and agenda.
- Module 2: Modernizing Cyber Threat Management
- Module 2 is focused on providing learners with an overview of the cybersecurity landscape, some of the past and future challenges of security operations practitioners, and the core issues that plague detection and response.
- Module 3: SecOps 101
- Module 3 is focused on providing learners with an end-to-end overview of Security Operations, so that all practitioners, regardless of their scope of work, have an aligned perspective of the mission to protect organizations against threats.
- Module 4: Autonomic Security Operations Overview
- Module 4 is focused on providing learners with a comprehensive understanding of the principles and practices of Autonomic Security Operations, a deep dive into transforming people, process, and technology, as well as a set of practical tips on operationalizing the principles of ASO.
- Module 5: Continuous Detection, Continuous Response
- Module 5 is focused on providing learners with a complete breakdown of the Continuous Detection, Continuous Response (CD/CR) methodology, including a deep dive into each function, examples of deployment pipelines, as well as access to labs that showcase these functions in a simulated environment.
- Module 6: Get Started with ASO
- Module 6 provides learners with a pathway to get started on identifying their key security challenges, assessing their maturity across the ASO maturity model, and a pathway to get started on the transformation journey.
- Module 7: Summary
- Module 7 recaps the course objectives and provide learners with a set of supplementary material to continue their knowledge journey.
Taught by
Google Cloud Training
Related Courses
Security Principles(ISC)² via Coursera A Strategic Approach to Cybersecurity
University of Maryland, College Park via Coursera FinTech for Finance and Business Leaders
ACCA via edX Access Control Concepts
(ISC)² via Coursera Access Controls
(ISC)² via Coursera