Security Tools and Technologies

Security Information and Event Management (SIEM) : A security solution that combines security information management (SIM) and security event management (SEM) to provide real-time analysis of security alerts generated by applications and ne…

Security Tools and Technologies

Security Information and Event Management (SIEM): A security solution that combines security information management (SIM) and security event management (SEM) to provide real-time analysis of security alerts generated by applications and network hardware. SIEM systems can correlate data from various sources and devices, enabling security teams to identify and respond to threats more efficiently.

Intrusion Detection System (IDS): A system that monitors network traffic for suspicious activity and alerts security personnel when such activity is discovered. An IDS can be host-based, monitoring individual devices for signs of intrusion, or network-based, analyzing traffic between devices.

Intrusion Prevention System (IPS): Similar to an IDS, an IPS monitors network traffic for suspicious activity. However, an IPS also has the capability to block or prevent suspected attacks in real-time, providing an additional layer of security.

Firewall: A network security device that monitors and controls incoming and outgoing network traffic based on predetermined security rules. A firewall can be hardware-based, software-based, or a combination of both.

Vulnerability Management: The practice of identifying, classifying, remediating, and mitigating vulnerabilities in an organization's systems and software. Vulnerability management is a critical component of a comprehensive security strategy, as it helps organizations reduce their attack surface and minimize the risk of a successful attack.

Penetration Testing: Also known as ethical hacking, penetration testing is the practice of simulating cyber attacks on an organization's systems and networks to identify vulnerabilities and weaknesses. The goal of penetration testing is to help organizations understand their risk posture and improve their security controls.

Security Orchestration, Automation, and Response (SOAR): A security solution that combines security orchestration, automation, and incident response to improve an organization's ability to detect, respond to, and recover from cyber threats. SOAR solutions enable security teams to automate repetitive tasks, streamline workflows, and improve collaboration and communication.

Identity and Access Management (IAM): The practice of ensuring that only authorized individuals have access to an organization's systems, applications, and data. IAM involves managing user identities, authenticating and authorizing access, and monitoring user activity for suspicious behavior.

Multi-Factor Authentication (MFA): A security measure that requires users to provide two or more forms of authentication to access a system or application. MFA can include something the user knows (such as a password), something the user has (such as a smart card), or something the user is (such as a fingerprint).

Zero Trust Security: A security model that assumes that all network traffic is untrusted, regardless of its source or destination. Zero trust security requires that all access to systems and data be authenticated, authorized, and encrypted, and that continuous monitoring and visibility be maintained to detect and respond to threats.

Security Operations Center (SOC): A centralized function within an organization that monitors and analyzes security-related events and incidents. A SOC typically includes a team of security analysts, engineers, and managers who work together to detect, respond to, and prevent cyber threats.

Threat Intelligence: Information about potential or current threats to an organization's systems and networks, including the tactics, techniques, and procedures (TTPs) used by threat actors. Threat intelligence can be used to improve an organization's security posture, detect and respond to threats more efficiently, and inform security decision-making.

Endpoint Detection and Response (EDR): A security solution that monitors and responds to security threats on endpoint devices such as laptops, desktops, and servers. EDR solutions can detect and respond to threats in real-time, providing visibility into endpoint activity and enabling security teams to investigate and remediate incidents more effectively.

Security Information Exchange (SIX): A platform that enables organizations to share security-related information and intelligence with trusted partners and communities. SIX can help organizations improve their threat intelligence, detect and respond to threats more efficiently, and collaborate with other organizations to improve overall security.

Artificial Intelligence (AI) and Machine Learning (ML): Technologies that enable security solutions to analyze large volumes of data, identify patterns and anomalies, and make decisions based on that analysis. AI and ML can be used to improve threat detection, incident response, and security automation.

Encryption: The practice of converting plaintext data into ciphertext, which cannot be read or understood by unauthorized parties. Encryption is a critical component of secure communication and data protection, and is used to protect data in transit and at rest.

Data Loss Prevention (DLP): A security solution that monitors and protects sensitive data as it is used, stored, and transmitted within an organization. DLP solutions can prevent data leakage, detect unauthorized data access, and ensure compliance with data protection regulations.

Security Awareness Training: The practice of educating employees about security threats and best practices to reduce the risk of security incidents. Security awareness training can include topics such as phishing, password management, and safe browsing habits.

Incident Response: The practice of detecting, responding to, and recovering from security incidents. Incident response involves a structured approach to identifying, containing, and mitigating the impact of security incidents, and includes processes for communication, evidence collection, and reporting.

Continuous Monitoring: The practice of continuously monitoring an organization's systems and networks for security-related events and incidents. Continuous monitoring enables security teams to detect and respond to threats more quickly, and can help organizations maintain compliance with regulatory requirements.

Red Team/Blue Team Exercises: A security training exercise that simulates a cyber attack on an organization's systems and networks. The red team plays the role of the attacker, while the blue team plays the role of the defender. Red team/blue team exercises can help organizations improve their security posture, identify weaknesses in their security controls, and improve incident response capabilities.

Cloud Security: The practice of securing cloud-based systems and applications. Cloud security involves a shared responsibility model, where the cloud provider is responsible for securing the underlying infrastructure, and the customer is responsible for securing their applications and data.

Internet of Things (IoT) Security: The practice of securing Internet of Things (IoT) devices, which are connected to the internet and can collect, transmit, and receive data. IoT security involves securing the devices themselves, as well as the networks and systems they connect to.

Operational Technology (OT) Security: The practice of securing operational technology (OT) systems, which are used to monitor and control industrial processes and critical infrastructure. OT security involves securing the systems themselves, as well as the networks and devices they connect to.

Cyber Threat Hunting: The practice of proactively searching for and identifying cyber threats that have evaded traditional security controls. Cyber threat hunting involves analyzing network and system data to identify indicators of compromise (IOCs) and other signs of malicious activity.

Security Compliance: The practice of ensuring that an organization's systems and processes comply with relevant security regulations and standards. Security compliance involves implementing and maintaining security controls, conducting regular audits and assessments, and reporting on compliance status.

Risk Management: The practice of identifying, assessing, and mitigating risks to an organization's systems and data. Risk management involves developing and implementing risk management strategies, monitoring and reporting on risk, and continuously improving risk management processes.

Security Orchestration: The practice of automating and coordinating security processes and workflows across multiple tools and systems. Security orchestration involves integrating security solutions, standardizing processes, and enabling security teams to work more efficiently.

Security Automation: The practice of automating repetitive security tasks and workflows. Security automation involves using technology to perform tasks such as data collection, analysis, and response, freeing up security teams to focus on more strategic activities.

DevSecOps: The practice of integrating security into the DevOps process, enabling organizations to build and deploy secure software more quickly and efficiently. DevSecOps involves shifting security left in the development process, automating security testing and validation, and continuously monitoring and improving security posture.

Container Security: The practice of securing container-based applications and environments. Container security involves securing the containers themselves, as well as the underlying infrastructure and networks they run on.

Identity Governance and Administration (IGA)

Key takeaways

  • SIEM systems can correlate data from various sources and devices, enabling security teams to identify and respond to threats more efficiently.
  • Intrusion Detection System (IDS): A system that monitors network traffic for suspicious activity and alerts security personnel when such activity is discovered.
  • However, an IPS also has the capability to block or prevent suspected attacks in real-time, providing an additional layer of security.
  • Firewall: A network security device that monitors and controls incoming and outgoing network traffic based on predetermined security rules.
  • Vulnerability management is a critical component of a comprehensive security strategy, as it helps organizations reduce their attack surface and minimize the risk of a successful attack.
  • Penetration Testing: Also known as ethical hacking, penetration testing is the practice of simulating cyber attacks on an organization's systems and networks to identify vulnerabilities and weaknesses.
  • SOAR solutions enable security teams to automate repetitive tasks, streamline workflows, and improve collaboration and communication.
May 2026 intake · open enrolment
from £99 GBP
Enrol