Systems & Application Security

Intermediate
  • 20 videos | 1h 30m 23s
  • Includes Assessment
  • Earns a Badge
Rating 4.3 of 27 users Rating 4.3 of 27 users (27)
Malicious attacks on systems and applications are an everyday problem. Discover how to identify and analyze malicious activity, including malicious code and countermeasures, and best practices for endpoint device security.

WHAT YOU WILL LEARN

  • Describe characteristics of malicious code
    Identify countermeasures for mitigating risk and damage from malicious code
    Distinguish between different types of malicious activity
    Identify countermeasures for mitigating risk and damage from malicious activity
    Use hids for endpoint device security
    Use host-based firewalls for endpoint device security
    Use application white-listing for endpoint device security
    Use endpoint encryption for endpoint device security
    Use trusted platform module for endpoint device security
    Use mobile device management for endpoint device security
  • Identify secure browsing best practices for endpoint device security
    Identify application vulnerabilities that apply to big data systems
    Identify architecture and design vulnerabilities that apply to big data systems
    Describe best practices for secure software-defined networking in virtual environments
    Identify characteristics and role of hypervisors in virtual environments
    Describe characteristics of virtual appliances and their role in virtual environments
    Describe continuity and resilience in secure virtual environments
    Identify the most common attacks on virtual environments and countermeasures for mitigating risk and damage
    Describe best practices for shared storage in virtual environments
    Describe best practices for implementing and operating systems and application security

IN THIS COURSE

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE

Rating 4.7 of 266 users Rating 4.7 of 266 users (266)
Rating 5.0 of 2 users Rating 5.0 of 2 users (2)

PEOPLE WHO VIEWED THIS ALSO VIEWED THESE

Rating 4.4 of 131 users Rating 4.4 of 131 users (131)
Rating 4.4 of 223 users Rating 4.4 of 223 users (223)
Rating 4.4 of 231 users Rating 4.4 of 231 users (231)