Systems & Application Security
Intermediate
- 20 videos | 1h 30m 23s
- Includes Assessment
- Earns a Badge
Malicious attacks on systems and applications are an everyday problem. Discover how to identify and analyze malicious activity, including malicious code and countermeasures, and best practices for endpoint device security.
WHAT YOU WILL LEARN
-
Describe characteristics of malicious codeIdentify countermeasures for mitigating risk and damage from malicious codeDistinguish between different types of malicious activityIdentify countermeasures for mitigating risk and damage from malicious activityUse hids for endpoint device securityUse host-based firewalls for endpoint device securityUse application white-listing for endpoint device securityUse endpoint encryption for endpoint device securityUse trusted platform module for endpoint device securityUse mobile device management for endpoint device security
-
Identify secure browsing best practices for endpoint device securityIdentify application vulnerabilities that apply to big data systemsIdentify architecture and design vulnerabilities that apply to big data systemsDescribe best practices for secure software-defined networking in virtual environmentsIdentify characteristics and role of hypervisors in virtual environmentsDescribe characteristics of virtual appliances and their role in virtual environmentsDescribe continuity and resilience in secure virtual environmentsIdentify the most common attacks on virtual environments and countermeasures for mitigating risk and damageDescribe best practices for shared storage in virtual environmentsDescribe best practices for implementing and operating systems and application security
IN THIS COURSE
-
11m 42sUpon completion of this video, you will be able to describe characteristics of malicious code. FREE ACCESS
-
7m 31sLearn how to identify countermeasures for mitigating risk and damage from malicious code. FREE ACCESS
-
6m 27sIn this video, you will learn to distinguish between different types of malicious activity. FREE ACCESS
-
3m 57sIn this video, you will learn how to identify countermeasures for mitigating risk and damage from malicious activity. FREE ACCESS
-
3m 16sDuring this video, you will learn how to use HIDS for endpoint device security. FREE ACCESS
-
3m 1sIn this video, find out how to use host-based firewalls for endpoint device security. FREE ACCESS
-
3m 52sLearn how to use application whitelisting for endpoint device security. FREE ACCESS
-
3m 55sIn this video, you will use endpoint encryption to secure endpoint devices. FREE ACCESS
-
2m 15sIn this video, you will use the trusted platform module for endpoint device security. FREE ACCESS
-
6m 28sLearn how to use mobile device management for endpoint security. FREE ACCESS
-
5m 57sFind out how to identify best practices for secure browsing and endpoint device security. FREE ACCESS
-
3m 21sFind out how to identify vulnerabilities in big data systems. FREE ACCESS
-
2m 45sIn this video, find out how to identify architecture and design vulnerabilities that apply to big data systems. FREE ACCESS
-
3m 20sAfter completing this video, you will be able to describe best practices for secure software-defined networking in virtual environments. FREE ACCESS
-
4m 10sIn this video, learn how to identify characteristics and the role of hypervisors in virtual environments. FREE ACCESS
-
3m 9sAfter completing this video, you will be able to describe characteristics of virtual appliances and their role in virtual environments. FREE ACCESS
-
4m 9sUpon completion of this video, you will be able to describe continuity and resilience in secure virtual environments. FREE ACCESS
-
3m 26sDuring this video, you will learn how to identify the most common attacks on virtual environments and how to mitigate risk and damage. FREE ACCESS
-
3m 57sAfter completing this video, you will be able to describe best practices for shared storage in virtual environments. FREE ACCESS
-
3m 47sAfter completing this video, you will be able to describe best practices for implementing and operating systems and application security. FREE ACCESS
EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE
Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.
Digital badges are yours to keep, forever.