We may earn an affiliate commission when you visit our partners.
DevSecCon

In this talk, Sarah Young will discuss how security operations change from on-prem to the cloud and how to optimize your security operations in a hybrid environment to make use of modern tooling such as automation and AI/ML.

Read more

In this talk, Sarah Young will discuss how security operations change from on-prem to the cloud and how to optimize your security operations in a hybrid environment to make use of modern tooling such as automation and AI/ML.

Security operations has always been hard. How many logs should you collect? Which logs should you collect? How do you respond and remediate things quickly? Then, just when you thought you've got it right for your on-premises, you decide to move the cloud and have to start all over again... or do you? In this talk, Sarah will discuss how security operations change from on-prem to the cloud and how to optimize your security operations in a hybrid environment to make use of modern tooling such as automation, AI/ML, etc.

Enroll now

Here's a deal for you

We found an offer that may be relevant to this course.
Save money when you learn. All coupon codes, vouchers, and discounts are applied automatically unless otherwise noted.

What's inside

Syllabus

Collection Is Not Detection and Other Rules for Modernising Sec Ops

Good to know

Know what's good
, what to watch for
, and possible dealbreakers
Thoroughly examines a wide range of logging and detection methods used for security operations professionals
Explores techniques to automate and optimize security operations, including AI/ML integration
Leverages expertise from industry-recognized instructor Sarah Young
Applies cutting-edge tooling and approaches to improve overall security operations in cloud and hybrid environments
Provides practical guidance on transforming security operations from on-premises to cloud environments
Emphasizes the importance of leveraging modern tooling to enhance security operations

Save this course

Save Collection Is Not Detection and Other Rules for Modernising Sec Ops to your list so you can find it easily later:
Save

Activities

Be better prepared before your course. Deepen your understanding during and after it. Supplement your coursework and achieve mastery of the topics covered in Collection Is Not Detection and Other Rules for Modernising Sec Ops with these activities:
Compile a Resource Hub on Hybrid Cloud Security Best Practices
Facilitates easy access to relevant information and encourages proactive security measures.
Browse courses on Hybrid Cloud Security
Show steps
  • Gather and curate articles, white papers, and other resources on hybrid cloud security.
  • Organize and categorize the resources for easy navigation.
  • Share the resource hub with your team or a wider community.
Review Cloud Fundamentals
Refresh your existing knowledge of cloud fundamentals, including cloud models, services, and architectural patterns.
Browse courses on Cloud Computing
Show steps
  • Review notes or reference materials on cloud computing concepts.
  • Complete practice exercises or quizzes on cloud fundamentals.
Explore Cloud Security Tools and Techniques
Seek out and follow tutorials on cloud security tools and techniques to enhance your understanding of securing cloud environments.
Browse courses on Cloud Security Tools
Show steps
  • Identify relevant cloud security tutorials on platforms like Pluralsight, Coursera, or Udemy.
  • Follow the tutorials step-by-step, implementing the tools and techniques in a practice environment.
Seven other activities
Expand to see all activities and additional details
Show all ten activities
Practice Hands-on Security Operations in a Lab
Reinforces comprehension of concepts covered in the course by providing a practical environment to apply them.
Browse courses on Security Operations
Show steps
  • Spin up a lab environment.
  • Run security scans and analyze results.
  • Configure and manage security tools.
  • Respond to security incidents and breaches.
Follow Walkthroughs on Implementing Modern Security Tooling
Enhances understanding of how modern security tooling works and how to integrate it into security operations.
Browse courses on Security Tools
Show steps
  • Identify security tools relevant to your environment.
  • Find and follow walkthroughs or tutorials.
  • Implement the tools in your lab or test environment.
  • Evaluate the effectiveness of the tools.
Respond to a hypothetical security incident
Practice responding to security incidents to reinforce incident response procedures and improve decision-making.
Show steps
  • Identify the type of security incident
  • Gather evidence and investigate the incident
  • Contain the incident and prevent further damage
  • Remediate the incident and restore systems
  • Document the incident and lessons learned
Develop a Security Playbook for Hybrid Cloud Environments
Facilitates practical application of knowledge and encourages critical thinking about security strategies.
Browse courses on Hybrid Cloud Security
Show steps
  • Define the scope and objectives of the playbook.
  • Identify and prioritize security risks in a hybrid cloud environment.
  • Develop response plans and procedures for each security risk.
  • Implement and test the playbook in a simulated environment.
Create a White Paper on Security Operations in Hybrid Cloud
Encourages in-depth understanding and critical analysis of security operations in hybrid cloud environments.
Browse courses on Security Operations
Show steps
  • Research and gather information on security operations in hybrid cloud.
  • Analyze and synthesize the information to identify key trends and challenges.
  • Write a well-structured white paper outlining the findings and recommendations.
Contribute to Open Source Security Projects
Provides hands-on experience, fosters collaboration, and enhances problem-solving skills.
Browse courses on Open Source Security
Show steps
  • Identify open source security projects that align with your interests.
  • Review the project documentation and choose an area to contribute.
  • Send pull requests or issue reports as needed.
  • Engage with the project community.
Become a Mentor for Aspiring Security Professionals
Strengthens knowledge retention, enhances communication skills, and fosters professional connections.
Browse courses on Mentorship
Show steps
  • Reach out to organizations, schools, or online platforms to offer your mentorship.
  • Provide guidance and support to mentees based on your experience and expertise.
  • Share resources and opportunities with your mentees.

Career center

Learners who complete Collection Is Not Detection and Other Rules for Modernising Sec Ops will develop knowledge and skills that may be useful to these careers:
Information Security Analyst
Information Security Analysts devise and implement measures to protect an organization's computer networks and systems from unauthorized access, use, disclosure, disruption, modification, or destruction.
Cloud Security Architect
Cloud Security Architects design and implement scalable, fault-tolerant, and secure solutions for cloud computing environments.
Security Engineer
Security Engineers manage an organization's security operations, including installing, configuring, and maintaining security software and hardware.
Incident Responder
Incident Responders are responsible for investigating and responding to security incidents, including data breaches, malware attacks, and phishing attempts.
Security Consultant
Security Consultants provide guidance to organizations on how to improve their security posture, including conducting risk assessments, developing security policies, and implementing security measures.
Penetration Tester
Penetration Testers evaluate the security of computer systems and networks by simulating attacks to identify vulnerabilities.
Cybersecurity Analyst
Cybersecurity Analysts monitor and analyze security data to identify and respond to threats, including malware, phishing attacks, and network intrusions.
Network Security Engineer
Network Security Engineers design and implement network security solutions, including firewalls, intrusion detection systems, and VPNs.
Security Operations Center (SOC) Analyst
SOC Analysts monitor and analyze security data to identify and respond to threats in real time.
Threat Intelligence Analyst
Threat Intelligence Analysts gather and analyze information about threats to an organization's security, including malware, phishing attacks, and network intrusions.
Security Architect
Security Architects design and implement security architectures for organizations, including network security, cloud security, and data security.
Data Security Analyst
Data Security Analysts protect sensitive data from unauthorized access, use, disclosure, disruption, modification, or destruction.
Security Manager
Security Managers oversee the security of an organization, including developing and implementing security policies, managing security budgets, and training staff on security awareness.
Security Researcher
Security Researchers conduct research to identify and mitigate security vulnerabilities in computer systems and networks.
Security Auditor
Security Auditors assess the security of computer systems and networks, including conducting risk assessments, developing security policies, and implementing security measures.

Reading list

We've selected 12 books that we think will supplement your learning. Use these to develop background knowledge, enrich your coursework, and gain a deeper understanding of the topics covered in Collection Is Not Detection and Other Rules for Modernising Sec Ops.
Provides a comprehensive overview of reverse engineering techniques, and how to use them to analyze software.
Provides a comprehensive overview of cryptography engineering, including how to design and implement secure systems.
Provides a comprehensive overview of applied cryptography, including a wide range of cryptographic algorithms and protocols.
Provides a comprehensive overview of security engineering, including best practices for designing and building secure distributed systems.
Provides a comprehensive overview of cloud security, including best practices for securing cloud applications and data.

Share

Help others find this course page by sharing it with your friends and followers:

Similar courses

Here are nine courses similar to Collection Is Not Detection and Other Rules for Modernising Sec Ops.
Elastic Stack: Getting Started
Most relevant
A Crash Course in Audit Logs
Monitoring Container Operations in Oracle Cloud Container...
Monitoring, Managing, and Maximizing Google Cloud...
Data in the Cloud: Executive Briefing
Windows Server 2022: Manage Virtual Machines and...
SRE Fundamentals and Security
Manage Security Operations
Security Event Triage: Leveraging Existing Security...
Our mission

OpenCourser helps millions of learners each year. People visit us to learn workspace skills, ace their exams, and nurture their curiosity.

Our extensive catalog contains over 50,000 courses and twice as many books. Browse by search, by topic, or even by career interests. We'll match you to the right resources quickly.

Find this site helpful? Tell a friend about us.

Affiliate disclosure

We're supported by our community of learners. When you purchase or subscribe to courses and programs or purchase books, we may earn a commission from our partners.

Your purchases help us maintain our catalog and keep our servers humming without ads.

Thank you for supporting OpenCourser.

© 2016 - 2024 OpenCourser