Course contentsShow
Security
Lesson 1498 of 3,05230. Operating System Security - MonitoringPro lesson

Audit Rules for Security Monitoring

Implementing CIS and STIG audit rules, detecting privilege escalation, monitoring security-relevant configuration changes.

This lesson is for subscribers

You've completed the free preview. Subscribe to unlock every lesson in every course.