Analyzing Output from Security Technologies

  • 12 Videos | 1h 2m 5s
  • Includes Assessment
  • Earns a Badge
Likes 55 Likes 55
A big trend today is using big data to analyze and handle security attacks. Discover how output can be gathered and analyzed using several of the common security technologies that are available.

WHAT YOU WILL LEARN

  • work with Host Intrusion Detection System (HIDS) and Host Intrusion Prevention System (HIPS)
    describe antivirus
    define file integrity check
    describe a host-based firewall
    specify application whitelisting
    define removable media control
  • compare patch management tools
    describe UTM
    define DLP
    specify data execution prevention
    describe web application firewall
    work with technology output analysis

IN THIS COURSE

  • Playable
    1. 
    Host Intrusion Prevention
    7m 10s
    UP NEXT
  • Playable
    2. 
    Antivirus
    4m 16s
  • Locked
    3. 
    File Integrity Check
    3m 36s
  • Locked
    4. 
    Host-based Firewall
    5m 40s
  • Locked
    5. 
    Application Whitelisting
    4m 17s
  • Locked
    6. 
    Removable Media Control
    4m 17s
  • Locked
    7. 
    Patch Management Tools
    3m 56s
  • Locked
    8. 
    Unified Threat Management (UTM)
    5m 23s
  • Locked
    9. 
    Data Loss Prevention (DLP)
    7m 42s
  • Locked
    10. 
    Data Execution Prevention (DEP)
    2m 34s
  • Locked
    11. 
    Web Application Firewall
    5m 25s
  • Locked
    12. 
    Exercise: Work with Technology Output Analysis
    2m 19s

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion of this course, which can be shared on any social network or business platform

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE

Likes 28 Likes 28  
Likes 77 Likes 77  

PEOPLE WHO VIEWED THIS ALSO VIEWED THESE

Likes 78 Likes 78  
Likes 131 Likes 131  
Likes 231 Likes 231