System Security Certified Practitioner (SSCP 2018): Malware & Endpoint Security
Intermediate
- 14 videos | 57m 16s
- Includes Assessment
- Earns a Badge
This 14-video course explores how malware infections occur, and how to mitigate these threats. Learners prepare for the Systems Security Certified Practitioner (SSCP) certification exam by examining how to compare current activity to a baseline. You will examine spyware, which tracks your computing usage with or without your consent, and adware, to direct information to the user. Next, explore rootkits, which stem from replacing UNIX Operating System files in the past with malicious code, and hide their presence. You will examine types of rootkits, including the form of files replaced on the host, running processes in memory, web browser plug-ins, on a Windows platform, or a Windows registry entry. You will examine backdoors which create a hidden entry point for malicious users, and is part of a rootkit. You will explore worms, viruses, and social engineering security threats. This course demonstrates how to configure common Windows Defender settings, and how to use the SCCM (System Center Configuration Manager), and malware policies by using white lists, and locking down USB removable media.
WHAT YOU WILL LEARN
-
Describe how comparing current activity to a baseline can identify suspicious activity, such as insider threats and data theft attemptsExplain how trojans can deliver malware such as spyware and adwareExplain how rootkits, trapdoors, and backdoors workDescribe how ransomware locks a system or dataCompare and contrast worms and virusesDescribe common examples of phishing email messages and how hids and host-based firewalls alone cannot protect systemsConfigure windows defender settings
-
Configure microsoft system center endpoint protectionExplain the benefits of whitelistingUse group policy to configure application blacklistsDescribe how ddos and botnets present a threatUse microsoft group policy to control usb removable mediaSecure end point devices
IN THIS COURSE
-
1m 45s
-
4m 2sUpon completion of this video, you will be able to describe how comparing current activity to a baseline can identify suspicious activity, such as insider threats and data theft attempts. FREE ACCESS
-
3m 46sAfter completing this video, you will be able to explain how trojans can deliver malware such as spyware and adware. FREE ACCESS
-
3m 27sAfter completing this video, you will be able to explain how rootkits, trapdoors, and backdoors work. FREE ACCESS
-
2m 40sUpon completion of this video, you will be able to describe how ransomware locks a system or data. FREE ACCESS
-
4m 48sLearn how to compare and contrast worms and viruses. FREE ACCESS
-
5m 20sUpon completion of this video, you will be able to describe common examples of phishing email messages and how HIDS and host-based firewalls cannot protect systems. FREE ACCESS
-
4m 11sIn this video, you will learn how to configure Windows Defender settings. FREE ACCESS
-
4m 10sIn this video, you will learn how to configure Microsoft System Center Endpoint Protection. FREE ACCESS
-
5m 3sAfter completing this video, you will be able to explain the benefits of whitelisting. FREE ACCESS
-
6mIn this video, learn how to configure application blacklists using Group Policy. FREE ACCESS
-
3m 54sUpon completion of this video, you will be able to describe how DDoS and botnets present a threat. FREE ACCESS
-
3m 16sLearn how to use Microsoft Group Policy to control USB removable media. FREE ACCESS
-
4m 56sIn this video, you will learn how to secure endpoint devices. FREE ACCESS
EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE
Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.
Digital badges are yours to keep, forever.