Из-за периодической блокировки нашего сайта РКН сервисами, просим воспользоваться резервным адресом:
Загрузить через dTub.ru Загрузить через ClipSaver.ruУ нас вы можете посмотреть бесплатно Introduction to Configuration Management and System Hardening или скачать в максимальном доступном качестве, которое было загружено на ютуб. Для скачивания выберите вариант из формы ниже:
Роботам не доступно скачивание файлов. Если вы считаете что это ошибочное сообщение - попробуйте зайти на сайт через браузер google chrome или mozilla firefox. Если сообщение не исчезает - напишите о проблеме в обратную связь. Спасибо.
Если кнопки скачивания не
загрузились
НАЖМИТЕ ЗДЕСЬ или обновите страницу
Если возникают проблемы со скачиванием, пожалуйста напишите в поддержку по адресу внизу
страницы.
Спасибо за использование сервиса savevideohd.ru
Want to earn Continuing Professional Education (CPE) credits? Visit https://store.natsar.com/intro-config... to watch the same video for free and receive a certificate of attendance, which can be used to fulfill continuing education requirements for cybersecurity certifications. Explore the essential concepts of configuration compliance and system hardening in this comprehensive course by Josh Moulin, Principal at Natsar. This video is designed for IT and cybersecurity professionals seeking to enhance their understanding of system configuration management and its role in improving organizational security. Learn how to use industry-standard tools and benchmarks to harden systems, prevent configuration drift, and ensure compliance with security best practices. This course is ideal for anyone looking to streamline operations, minimize risks, or learn practical techniques for safeguarding IT environments. Key topics covered include: The importance of configuration compliance and its impact on cybersecurity. Creating and deploying hardened system images to maintain security and consistency. Leveraging benchmarks such as CIS Benchmarks and DISA STIGs to establish secure configurations. Scanning and validating systems for compliance using tools like CIS-CAT and DISA SCAP. Using group policies and automated tools to enforce secure configurations across environments. Real-world examples demonstrating how organizations implement and maintain configuration compliance. For more cybersecurity resources, visit https://Natsar.com. This video provides actionable insights and practical strategies to enhance your configuration compliance processes and strengthen your security posture. Whether you’re new to configuration management or an experienced professional, you’ll find valuable guidance in this course. Subscribe now for more expert tips and insights on cybersecurity. You can also sign up for Natsar’s newsletter at https://natsar.substack.com. Chapters: 00:00 - Introduction 01:06 - Course objectives 02:00 - Introduction to Configuration Compliance and Baselines 08:45 - Baseline Configuration Practical Example 15:14 - Configuration Compliance Lifecycle 16:42 - CIS Benchmarks and DISA STIGs 26:34 - CIS-CAT Lite Overview 28:15 - DISA SCAP Tool Overview 29:49 - Maintenance of Baselines and Use in Incident Response 35:16 - Digital Forensic Use Cases of Configuration Baselines 38:34 - Demonstration of Installation and Use of CIS-CAT Lite 48:02 - Demonstration of Installation and Use of DISA SCAP Tool