Systems & Application Security

Intermediate
  • 20 videos | 1h 30m 23s
  • Includes Assessment
  • Earns a Badge
Rating 4.3 of 27 users Rating 4.3 of 27 users (27)
Malicious attacks on systems and applications are an everyday problem. Discover how to identify and analyze malicious activity, including malicious code and countermeasures, and best practices for endpoint device security.

WHAT YOU WILL LEARN

  • Describe characteristics of malicious code
    Identify countermeasures for mitigating risk and damage from malicious code
    Distinguish between different types of malicious activity
    Identify countermeasures for mitigating risk and damage from malicious activity
    Use hids for endpoint device security
    Use host-based firewalls for endpoint device security
    Use application white-listing for endpoint device security
    Use endpoint encryption for endpoint device security
    Use trusted platform module for endpoint device security
    Use mobile device management for endpoint device security
  • Identify secure browsing best practices for endpoint device security
    Identify application vulnerabilities that apply to big data systems
    Identify architecture and design vulnerabilities that apply to big data systems
    Describe best practices for secure software-defined networking in virtual environments
    Identify characteristics and role of hypervisors in virtual environments
    Describe characteristics of virtual appliances and their role in virtual environments
    Describe continuity and resilience in secure virtual environments
    Identify the most common attacks on virtual environments and countermeasures for mitigating risk and damage
    Describe best practices for shared storage in virtual environments
    Describe best practices for implementing and operating systems and application security

IN THIS COURSE

  • 11m 42s
    Upon completion of this video, you will be able to describe characteristics of malicious code. FREE ACCESS
  • 7m 31s
    Learn how to identify countermeasures for mitigating risk and damage from malicious code. FREE ACCESS
  • Locked
    3.  Identifying Malicious Activity
    6m 27s
    In this video, you will learn to distinguish between different types of malicious activity. FREE ACCESS
  • Locked
    4.  Malicious Activity Countermeasures
    3m 57s
    In this video, you will learn how to identify countermeasures for mitigating risk and damage from malicious activity. FREE ACCESS
  • Locked
    5.  HIDS
    3m 16s
    During this video, you will learn how to use HIDS for endpoint device security. FREE ACCESS
  • Locked
    6.  Host-based Firewalls
    3m 1s
    In this video, find out how to use host-based firewalls for endpoint device security. FREE ACCESS
  • Locked
    7.  Application White Listing
    3m 52s
    Learn how to use application whitelisting for endpoint device security. FREE ACCESS
  • Locked
    8.  Endpoint Encryption
    3m 55s
    In this video, you will use endpoint encryption to secure endpoint devices. FREE ACCESS
  • Locked
    9.  Trusted Platform Module
    2m 15s
    In this video, you will use the trusted platform module for endpoint device security. FREE ACCESS
  • Locked
    10.  Mobile Device Management
    6m 28s
    Learn how to use mobile device management for endpoint security. FREE ACCESS
  • Locked
    11.  Secure Browsing
    5m 57s
    Find out how to identify best practices for secure browsing and endpoint device security. FREE ACCESS
  • Locked
    12.  Application Vulnerabilities
    3m 21s
    Find out how to identify vulnerabilities in big data systems. FREE ACCESS
  • Locked
    13.  Architecture and Design Vulnerabilities
    2m 45s
    In this video, find out how to identify architecture and design vulnerabilities that apply to big data systems. FREE ACCESS
  • Locked
    14.  Software-defined Networking
    3m 20s
    After completing this video, you will be able to describe best practices for secure software-defined networking in virtual environments. FREE ACCESS
  • Locked
    15.  Hypervisor
    4m 10s
    In this video, learn how to identify characteristics and the role of hypervisors in virtual environments. FREE ACCESS
  • Locked
    16.  Virtual Appliances
    3m 9s
    After completing this video, you will be able to describe characteristics of virtual appliances and their role in virtual environments. FREE ACCESS
  • Locked
    17.  Continuity and Resilience
    4m 9s
    Upon completion of this video, you will be able to describe continuity and resilience in secure virtual environments. FREE ACCESS
  • Locked
    18.  Virtual Environment Attacks and Countermeasures
    3m 26s
    During this video, you will learn how to identify the most common attacks on virtual environments and how to mitigate risk and damage. FREE ACCESS
  • Locked
    19.  Shared Storage
    3m 57s
    After completing this video, you will be able to describe best practices for shared storage in virtual environments. FREE ACCESS
  • Locked
    20.  Exercise: Securing Systems and Applications
    3m 47s
    After completing this video, you will be able to describe best practices for implementing and operating systems and application security. FREE ACCESS

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE

Rating 4.7 of 266 users Rating 4.7 of 266 users (266)
Rating 4.5 of 2 users Rating 4.5 of 2 users (2)
Rating 4.0 of 1 users Rating 4.0 of 1 users (1)

PEOPLE WHO VIEWED THIS ALSO VIEWED THESE

Rating 4.5 of 110 users Rating 4.5 of 110 users (110)
Rating 4.5 of 27188 users Rating 4.5 of 27188 users (27188)
Rating 4.5 of 192 users Rating 4.5 of 192 users (192)