KnowledgeCenters IT Security KnowledgeCenter IT Security Courses
Malicious attacks on systems and applications are now an everyday problem, and security professionals have to know how to identify and protect against them. This course covers how to identify and analyze malicious activity, including malicious code and countermeasures. It also outlines best practices for endpoint device and cloud security, including host-based firewalls, HIDS, virtualization, and service models. In this course, you will learn about best practices for securing big data systems and operating and securing virtual environments, including appliance and attack countermeasures. This course is one of a series in the learning path that covers the objectives for the (ISC)2 Systems Security Certified Practitioner Exam.
Objectives |
Identifying and Analyzing Malicious Activity - start the course
- describe characteristics of malicious code
- identify countermeasures for mitigating risk and damage from malicious code
- distinguish between different types of malicious activity
- identify countermeasures for mitigating risk and damage from malicious activity
Operating Endpoint Device Security - use HIDS for endpoint device security
- use host-based firewalls for endpoint device security
- use application whitelisting for endpoint device security
- use endpoint encryption for endpoint device security
- use trusted platform module for endpoint device security
- use mobile device management for endpoint device security
- identify secure browsing best practices for endpoint device security
Operating and Configuring Cloud Security - distinguish between cloud security operation models
- distinguish between cloud security service models
- describe characteristics of cloud virtualization
- identify the legal and privacy concerns associated with cloud security
- identify secure data storage and transmission options for cloud security
- identify security requirements when outsourcing cloud services
Securing Big Data Systems - identify application vulnerabilities that apply to big data systems
- identify architecture and design vulnerabilities that apply to big data systems
Operating and Securing Virtual Environments - describe best practices for secure software-defined networking in virtual environments
- identify characteristics and role of hypervisors in virtual environments
- describe characteristics of virtual appliances and their role in virtual environments
- describe continuity and resilience in secure virtual environments
- identify the most common attacks on virtual environments and countermeasures for mitigating risk and damage
- describe best practices for shared storage in virtual environments
Practice: Systems & Applications Security - describe best practices for implementing and operating systems and application security
|