Internet And Network Technologies
Monitoring System Configuration
Monitoring & Securing System Configuration

Monitoring & Securing System Configuration

Course Number:
Lesson Objectives

Monitoring & Securing System Configuration

  • discover the key concepts covered in this course
  • describe the configuration management process and how it can influence securing system configuration for incident response
  • describe tools and software available to monitor systems and their advantages for incident response
  • describe continuous monitoring in risk management, including the three-tier approach and how it relates to monitoring system configuration
  • recognize the process of minor, major, and unknown configuration changes, including what it means to an organization in terms of incident response and how they are prioritized in an incident strategy
  • recognize the importance of securing the CM process in the SDLC for preventing security impacts
  • recognize methods for identifying common high probability items, such as identifying default or weak credentials
  • describe the process of implementing a secure system configuration monitoring program
  • assess the monitoring process and perform a security configuration evaluation
  • recognize methods of monitoring releases and deliveries throughout the software development lifecycle
  • describe security controls for monitoring system configuration in a cyber framework
  • recognize challenges organizations face today in monitoring system configuration and how they can be overcome
  • recognize how monitoring system configuration is important in today's enterprise SDLC
  • summarize the key concepts covered in this course


In this course, you'll learn how to drive system configuration monitoring using continuous monitoring tools to keep systems secure. You'll explore the concept and importance of monitoring system configuration within an organization for incident response. Next, you'll examine tools and strategies you can use to identify common issues, such as identifying weak passwords or common devices that use default credentials. You'll explore processes for operating and maintaining monitoring systems, including the use of security controls and assessments to ensure the incident response team remains compliant. Finally, you'll discover how to identify and interpret report findings from monitoring result, how to work with a monitoring program for system configuration, and how to recognize monitoring program challenges and possible solutions for incident response.


Prerequisites: none

Close Chat Live