In this lesson students will learn about the importance of Continuous Monitoring to identify Cybersecurity Events before they can escalate into a Cybersecurity Incident. In this lesson we will clarify some of the technical requirements required to proactively Monitoring Continuously. These requirements include monitoring physical security of facilities and infrastructure, personnel activity, Malicious Code, Unauthorized Mobile Code, Unauthorized Devices, Service Provider access to the facilities and infrastructure, and regular Vulnerability Scanning. In this lesson we will review many valuable considerations for the establishment of Continual Monitoring. We will also provide an exercise for students to practice their newfound knowledge and develop new Cybersecurity skills.