System Security Certified Practitioner (SSCP 2018): Malware & Endpoint Security

Intermediate
  • 14 videos | 57m 16s
  • Includes Assessment
  • Earns a Badge
Rating 4.4 of 30 users Rating 4.4 of 30 users (30)
This 14-video course explores how malware infections occur, and how to mitigate these threats. Learners prepare for the Systems Security Certified Practitioner (SSCP) certification exam by examining how to compare current activity to a baseline. You will examine spyware, which tracks your computing usage with or without your consent, and adware, to direct information to the user. Next, explore rootkits, which stem from replacing UNIX Operating System files in the past with malicious code, and hide their presence. You will examine types of rootkits, including the form of files replaced on the host, running processes in memory, web browser plug-ins, on a Windows platform, or a Windows registry entry. You will examine backdoors which create a hidden entry point for malicious users, and is part of a rootkit. You will explore worms, viruses, and social engineering security threats. This course demonstrates how to configure common Windows Defender settings, and how to use the SCCM (System Center Configuration Manager), and malware policies by using white lists, and locking down USB removable media.

WHAT YOU WILL LEARN

  • Describe how comparing current activity to a baseline can identify suspicious activity, such as insider threats and data theft attempts
    Explain how trojans can deliver malware such as spyware and adware
    Explain how rootkits, trapdoors, and backdoors work
    Describe how ransomware locks a system or data
    Compare and contrast worms and viruses
    Describe common examples of phishing email messages and how hids and host-based firewalls alone cannot protect systems
    Configure windows defender settings
  • Configure microsoft system center endpoint protection
    Explain the benefits of whitelisting
    Use group policy to configure application blacklists
    Describe how ddos and botnets present a threat
    Use microsoft group policy to control usb removable media
    Secure end point devices

IN THIS COURSE

  • 1m 45s
  • 4m 2s
    Upon completion of this video, you will be able to describe how comparing current activity to a baseline can identify suspicious activity, such as insider threats and data theft attempts. FREE ACCESS
  • Locked
    3.  Spyware and Adware
    3m 46s
    After completing this video, you will be able to explain how trojans can deliver malware such as spyware and adware. FREE ACCESS
  • Locked
    4.  RootKits
    3m 27s
    After completing this video, you will be able to explain how rootkits, trapdoors, and backdoors work. FREE ACCESS
  • Locked
    5.  Ransomware
    2m 40s
    Upon completion of this video, you will be able to describe how ransomware locks a system or data. FREE ACCESS
  • Locked
    6.  Worms and Viruses
    4m 48s
    Learn how to compare and contrast worms and viruses. FREE ACCESS
  • Locked
    7.  Social Engineering
    5m 20s
    Upon completion of this video, you will be able to describe common examples of phishing email messages and how HIDS and host-based firewalls cannot protect systems. FREE ACCESS
  • Locked
    8.  Malware Scanning
    4m 11s
    In this video, you will learn how to configure Windows Defender settings. FREE ACCESS
  • Locked
    9.  Malware Policies
    4m 10s
    In this video, you will learn how to configure Microsoft System Center Endpoint Protection. FREE ACCESS
  • Locked
    10.  Whitelisting
    5m 3s
    After completing this video, you will be able to explain the benefits of whitelisting. FREE ACCESS
  • Locked
    11.  Configure Windows Application Blacklists
    6m
    In this video, learn how to configure application blacklists using Group Policy. FREE ACCESS
  • Locked
    12.  Larger Scale Attacks
    3m 54s
    Upon completion of this video, you will be able to describe how DDoS and botnets present a threat. FREE ACCESS
  • Locked
    13.  Lock Down USB Removable Media
    3m 16s
    Learn how to use Microsoft Group Policy to control USB removable media. FREE ACCESS
  • Locked
    14.  Exercise: Configure Endpoint Security Settings
    4m 56s
    In this video, you will learn how to secure endpoint devices. FREE ACCESS

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE

Rating 4.7 of 16 users Rating 4.7 of 16 users (16)
Rating 4.4 of 17 users Rating 4.4 of 17 users (17)
Rating 4.5 of 34 users Rating 4.5 of 34 users (34)

PEOPLE WHO VIEWED THIS ALSO VIEWED THESE

Rating 3.8 of 29 users Rating 3.8 of 29 users (29)
Rating 4.5 of 52 users Rating 4.5 of 52 users (52)
Rating 4.4 of 31 users Rating 4.4 of 31 users (31)