Compliance and Safety → Cybersecurity

Threat Monitoring (CS032)


Description
Any organization, regardless of size or sector, can become a victim of cybercrime. The organization you work for is no different. You may feel confident that your existing protection against attacks is sufficient. But as you’ll already know, traditional methods like firewalls and even antivirus software aren’t enough to keep attacks at bay. So what is?

Having a Threat Monitoring policy in place is key. The strategy you take towards detection and prevention, and which service provider you use will have a huge impact in keeping your data safe. This course is designed to help you protect against attacks rather than just responding to them. This will help preserve your company's reputation and also keep your networks and data safe.

By the end of this course, you’ll be able to:

• Understand why organizations need to invest in threat monitoring
• Define the difference between detection and prevention and the role played by each
• Recognize the value of continuous security monitoring (CSM) and working with external Managed Security Service Providers (MSSPs)

Why take this course?

IT managers and teams and security managers all need to understand the value of threat monitoring. This course will tell you why it’s essential. It’ll also walk you through how to prevent rather than just detect attacks and how continuous security monitoring can help your organization up its threat-monitoring game.

10 mins | SCORM | Workbook

Content
  • Threat Monitoring
Completion rules
  • All units must be completed