This course is designed for IT Security Administrators and Consultants. It is an intermediate course that dives deep into the management of security policies across different Cisco security solutions using CDO. The course will focus on technical topics like policy management, object management, and event logging.
Mastering Security Management with CDO
This course is part of Security Administration with CDO Specialization
Instructor: Muhammad Ramzan Khan
Sponsored by BrightStar Care
Recommended experience
Details to know
Add to your LinkedIn profile
12 assignments
See how employees at top companies are mastering in-demand skills
Build your subject-matter expertise
- Learn new concepts from industry experts
- Gain a foundational understanding of a subject or tool
- Develop job-relevant skills with hands-on projects
- Earn a shareable career certificate
Earn a career certificate
Add this credential to your LinkedIn profile, resume, or CV
Share it on social media and in your performance review
There are 3 modules in this course
This module is designed to provide you with a comprehensive understanding of the main components and functionality of Cisco Defense Orchestrator (CDO), a powerful, cloud-based platform that simplifies and streamlines security policy management. The module will discuss both the graphical user interface (GUI) and Command Line Interface (CLI) aspects. You will learn how to leverage CDO to effectively manage security policies and create a basic security policy using this intuitive platform.
What's included
8 videos5 readings4 assignments1 discussion prompt1 plugin
This module is designed to provide you with a concise overview of the role and functions of object management in a Centralized Device Orchestrator (CDO) environment. You will gain practical experience in applying object management techniques through simulated CDO environments, analyze common challenges related to maintaining object consistency across devices, and learn to design effective object management plans to ensure consistency.
What's included
8 videos3 readings4 assignments1 discussion prompt2 plugins
This module is designed to provide you with a comprehensive understanding of the role and importance of event logging in IT security management, equipping students with the knowledge and skills necessary to interpret log events and alerts, evaluate strategies for responding to security events, and formulate a process for using event logs to enhance security measures.
What's included
8 videos3 readings4 assignments1 discussion prompt2 plugins
Instructor
Offered by
Why people choose Coursera for their career
Recommended if you're interested in Computer Science
Open new doors with Coursera Plus
Unlimited access to 10,000+ world-class courses, hands-on projects, and job-ready certificate programs - all included in your subscription
Advance your career with an online degree
Earn a degree from world-class universities - 100% online
Join over 3,400 global companies that choose Coursera for Business
Upskill your employees to excel in the digital economy