5910 Breckenridge Pkwy Suite B, Tampa, FL. 33610
(800) 272-0707

SkillSoft Explore Course

IT Skills     Security     Security Accreditations and Best Practice     Certified Ethical Hacker (CEH) v10

Explore how Security Incident and Event Monitoring (SIEM), User Behavior Analytics (UBA), and Access Control Lists can be used to prevent data loss or leakage.



Objectives

CEHv10: Security Controls Part 2

  • develop an incident management and response procedure and describe SIEM and UBA
  • describe access controls, the different types of access control mechanisms, data leakage, leak prevention, and data loss prevention