Systems & Application Security
Intermediate
- 20 Videos | 1h 30m 23s
- Includes Assessment
- Earns a Badge
Malicious attacks on systems and applications are an everyday problem. Discover how to identify and analyze malicious activity, including malicious code and countermeasures, and best practices for endpoint device security.
WHAT YOU WILL LEARN
-
describe characteristics of malicious codeidentify countermeasures for mitigating risk and damage from malicious codedistinguish between different types of malicious activityidentify countermeasures for mitigating risk and damage from malicious activityuse HIDS for endpoint device securityuse host-based firewalls for endpoint device securityuse application white-listing for endpoint device securityuse endpoint encryption for endpoint device securityuse trusted platform module for endpoint device securityuse mobile device management for endpoint device security
-
identify secure browsing best practices for endpoint device securityidentify application vulnerabilities that apply to big data systemsidentify architecture and design vulnerabilities that apply to big data systemsdescribe best practices for secure software-defined networking in virtual environmentsidentify characteristics and role of hypervisors in virtual environmentsdescribe characteristics of virtual appliances and their role in virtual environmentsdescribe continuity and resilience in secure virtual environmentsidentify the most common attacks on virtual environments and countermeasures for mitigating risk and damagedescribe best practices for shared storage in virtual environmentsdescribe best practices for implementing and operating systems and application security
IN THIS COURSE
-
1.Malicious Code11m 42sUP NEXT
-
2.Malicious Code Countermeasures7m 31s
-
3.Identifying Malicious Activity6m 27s
-
4.Malicious Activity Countermeasures3m 57s
-
5.HIDS3m 16s
-
6.Host-based Firewalls3m 1s
-
7.Application White Listing3m 52s
-
8.Endpoint Encryption3m 55s
-
9.Trusted Platform Module2m 15s
-
10.Mobile Device Management6m 28s
-
11.Secure Browsing5m 57s
-
12.Application Vulnerabilities3m 21s
-
13.Architecture and Design Vulnerabilities2m 45s
-
14.Software-defined Networking3m 20s
-
15.Hypervisor4m 10s
-
16.Virtual Appliances3m 9s
-
17.Continuity and Resilience4m 9s
-
18.Virtual Environment Attacks and Countermeasures3m 26s
-
19.Shared Storage3m 57s
-
20.Exercise: Securing Systems and Applications3m 47s
EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE
Skillsoft is providing you the opportunity to earn a digital badge upon successful completion of this course, which can be shared on any social network or business platform
Digital badges are yours to keep, forever.YOU MIGHT ALSO LIKE
CHANNEL
Wintellect Application Security