Description

Malicious attacks on systems and
applications are now an everyday problem, and security professionals have to
know how to identify and protect against them. This course covers how to
identify and analyze malicious activity, including malicious code and
countermeasures. It also outlines best practices for endpoint device and cloud
security, including host-based firewalls, HIDS, virtualization, and service
models. In this course, you will learn about best practices for securing big
data systems and operating and securing virtual environments, including
appliance and attack countermeasures. This course is one of a series in the
Skillsoft learning path that covers the objectives for the (ISC)2 Systems
Security Certified Practitioner Exam.


Course Lessons

Total: 1 Lesson

Related Courses

E-learning

Cyber and App Security

Automated Tools For Ap...

E-learning

Cyber and App Security

Tips And Tricks For De...

E-learning

Cyber and App Security

Software Programming F...

E-learning

Cyber and App Security

Cryptography Fundament...

E-learning

Cyber and App Security

Defensive Programming ...

E-learning

Cyber and App Security

Defensive Programming ...

E-learning

Cyber and App Security

Software Security

E-learning

Cyber and App Security

Network Security

E-learning

Cyber and App Security

OWASP Beginner

E-learning

Cyber and App Security

OWASP Intermediate

E-learning

Cyber and App Security

Cyber Security Beginner

E-learning

Cyber and App Security

Cyber Security Interme...

E-learning

Cyber and App Security

Cyber Security Expert

E-learning

Cyber and App Security

Mobile Security Interm...

E-learning

Cyber and App Security

Cryptography Beginner

E-learning

Cyber and App Security

Cyber Security Beginne...

E-learning

Cyber and App Security

Cyber Security Interme...

Course Reviews:

5

5 Ratings

Average Rating

  • 5 STARS
    1
  • 4 STARS
    0
  • 3 STARS
    0
  • 2 STARS
    0
  • 1 STAR
    0

Reviews

  • This course provides the best knowledge and awareness about systems and application security. It is adding weight to my skills and understanding of systems and applications security.