Using Security Operations, security analysts and vulnerability managers can seamlessly automate their security tools and communicate with IT by working in a united platform. This course is designed for Security Operations administrators, ServiceNow administrators, and consultants who need to configure and administer ServiceNow Security Operations applications. Learners attending the course can expect to learn how to leverage Security Operations applications to improve their organization’s security maturity by identifying, prioritizing, and remediating vulnerabilities, critical security incidents, and misconfigured assets.
ServiceNow SIR Implementation Course Information
In this course, you will:
- Demonstrate Baseline Security Incident Response Lifecycle
- Identify Security Incident Response Workflow-Based Responses
- Partner with Now Assist AI to summarize security incidents
- Partner with Now Assist AI to generate closure notes
- Configure Vulnerability Assessment and Management Response Tools
- Explore the Vulnerability Response Application
- Create Watch Topics and Explore Remediation Efforts
- Explore the Threat Intelligence Application
- Employ Threat Sources and Explore Attack Modes and Methods
- Define Observables, Indicators of Compromise (IoC), IoC Look Ups
- View and Analyze Security Operations Data
Prerequisites
ServiceNow SIR Implementation Course Outline
Module 1: Security Operations Overview
Objectives
- Learn the Current State of Security; Explore Security Maturity Levels.
- Discover the ServiceNow Security Operations application.
- Walk through a typical SecOps security Incident (Day in the Life).
- Explore Essential platform and security administration concepts.
- Learn the current state of security and explore Security Operations maturity.
- Explore Essential Platform and Security Administration Concepts.
Labs
- Lab 1.3 Security Operations User Administration
Module 2: Security Operations Common Functionality
Objectives
- Investigate Security Operations Common Functionality.
Labs
- Lab 2.3.1 Email Parser
- Lab 2.3.2 Security Operations Common Functionality
Module 3: Vulnerability Response
Objectives
- Overview of Vulnerability Response
- Explore Infrastructure Vulnerability Response
- Explore Application Vulnerability Response
- Explore Container Vulnerability Response
- Explore Vulnerability Exclusion Rules
- Explore Configuration Compliance
- Explore Security Posture Control (SPC)
- Explore Cybersecurity Executive Dashboard
Labs
- Lab 3.1 Explore the Vulnerability Response Application
- Lab 3.1.2 Explore Vulnerability Entries
- Lab 3.2.1 Explore Vulnerable Items and Solutions
- Lab 3.2.2 Watch Topics and Remediation Efforts
- Lab 3.2.3 Vulnerability Remediation
Module 4: Security Incident Response
Objectives
- Overview of the Security Incident Response Application
- View Security Incident Response Components and Configuration
- Explore Security Incident Response Workflow-Based Responses
- Explore Major Security Incident Management (MSIM) Workspace
- Now Assist AI for Security Operations
Labs
- Lab 4.2 Creating Security Incidents
- Lab 4.3.1 Security Incident Response Configuration
- Lab 4.4 Now Assist AI for Security Operations
Module 5: Threat Intelligence
Objectives
- Define ServiceNow Threat Intelligence
- Set Up Threat Sources
- Explore Attack Modes and Methods
- Understand Observables, IoCs and IoC Look Ups
- Explore Threat Intelligence Security Center
Labs
- Lab 5.3.1 Review and Update an Existing Attack Mode/Method
- Lab 5.3.2 Working with Indicators of Compromise
- Lab 5.3.3 Automated Lookups in Security Incidents