IT Professional Curricula Internet and Network Technologies Solution Area Security Solutions Certified Ethical Hacker (CEH) v10
Explore how Security Incident and Event Monitoring (SIEM), User Behavior Analytics (UBA), and Access Control Lists can be used to prevent data loss or leakage.
Objectives |
---|
CEHv10: Pentesting, Laws, and Standards
|