ServiceNow Security Operations (SecOps) Fundamentals [SNSOF]

Total time
Location
At location
Starting date and place
Logo Global Knowledge Network Training Ltd.

Need more information? Get more details on the site of the provider.

Starting dates and places

placeVirtual - UK Time Zone
28 Jun 2021 until 29 Jun 2021
placeVirtual - UK Time Zone
2 Sep 2021 until 3 Sep 2021

Description

OVERVIEW

Learn about the Security Incident Response, Vulnerability Response, and Threat Intelligence applications.

This two-day course covers the foundational topics of the ServiceNow Security Operation suite. The Security Operations Suite includes the Security Incident Response, Vulnerability Response, and Threat Intelligence applications. The Security Operations Suite provides the tools needed to manage the identification of threats and vulnerabilities within your organization as well as specific tools to assist in the management of Security Incidents.

OBJECTIVES

After you complete this course you will be able to:

  • Discuss the Current State of Security
  • Explain the Security Operations Matur…

Read the complete description

Frequently asked questions

There are no frequently asked questions yet. If you have any more questions or need help, contact our customer service.

OVERVIEW

Learn about the Security Incident Response, Vulnerability Response, and Threat Intelligence applications.

This two-day course covers the foundational topics of the ServiceNow Security Operation suite. The Security Operations Suite includes the Security Incident Response, Vulnerability Response, and Threat Intelligence applications. The Security Operations Suite provides the tools needed to manage the identification of threats and vulnerabilities within your organization as well as specific tools to assist in the management of Security Incidents.

OBJECTIVES

After you complete this course you will be able to:

  • Discuss the Current State of Security
  • Explain the Security Operations Maturity levels
  • Describe Security Incident Response Components and Configuration
  • Demonstrate the Baseline Security Incident Response Lifecycle
  • Identify Security Incident Response Workflow-Based Responses
  • Configure Vulnerability Assessment and Management Response tools
  • Explore the ServiceNow Threat Intelligence application
  • Employ Threat Sources and Explore Attack Modes and Methods
  • Define Observables, Indicators of Compromise (IOC) and IoC Look Ups
  • Discuss Security Operations Common Functionality
  • Use Security Operations Integrations
  • Demonstrate how to view and analyze Security Operations data

AUDIENCE

This course is designed for Security Operations administrators, ServiceNow administrators, and consultants who need to configure and administer ServiceNow Security Management. Additional training in ServiceNow administration, scripting, integration, and development would be helpful.

CONTENT

Security Operations Overview

  • Current State of Security and Security Operations Maturity Levels
  • Introducing ServiceNow Security Operations
  • Essential Platform and Security Administration Concepts
  • Security Operations Common Functionality
  • Lab 1.3 Security Operations User Administration
  • Lab 1.4.1 Security Operations Common Functionality
  • Lab 1.4.2 Email Parser

Vulnerability Response

  • Vulnerability Response Overview
  • Vulnerability Classification and Assignment
  • Vulnerability Management
  • Configuration Compliance
  • Lab 2.1 Explore the Vulnerability Response Application
  • Lab 2.2 Explore Vulnerable Items and Vulnerability Groups
  • Lab 2.3 Vulnerability Groups (for Grouping Vulnerable Items)
  • Lab 2.4 Vulnerability Remediation

Security Incident Response

  • Security Incident Response Overview
  • Security Incident Response Components and Configuration
  • Baseline Security Incident Response Lifecycle
  • Security Incident Response Workflow-Based Responses
  • Lab 3.2 Security Incident Response Configuration
  • Lab 3.3 Creating Security Incidents

Threat Intelligence

  • Threat Intelligence Definition
  • Threat Intelligence Terminology
  • Threat Intelligence Toolsets
  • Trusted Security Circles
  • Lab 4.3.1 Review and Update an Existing Attack Mode or Method
  • Lab 4.3.2 Working with Indicators of Compromise (IOC) Lookups
  • Lab 4.3.3 Automated Lookups in Security Incidents

Security Operations Integrations

  • Work with Security Operations
  • Lab 5.1 Navigating Security Operations Integrations

Data Visualization

  • Understand Security Operations Monitoring and Reporting
There are no reviews yet.

Share your review

Do you have experience with this course? Submit your review and help other people make the right choice. As a thank you for your effort we will donate £1.- to Stichting Edukans.

There are no frequently asked questions yet. If you have any more questions or need help, contact our customer service.