• Online, Self-Paced
Course Description

Explore how Security Incident and Event Monitoring (SIEM), User Behavior Analytics (UBA), and Access Control Lists can be used to prevent data loss or leakage.

Learning Objectives

CEHv10: Pentesting, Laws, and Standards

  • describe the types, phases, and methodologies of penetration testing, and how it helps with security assessments
  • recognize common security laws, regulations and standards created by industries and government bodies

Framework Connections

The materials within this course focus on the NICE Framework Task, Knowledge, and Skill statements identified within the indicated NICE Framework component(s):

Specialty Areas

  • Cyber Operations
  • Cybersecurity Management
  • Exploitation Analysis
  • Threat Analysis
  • Vulnerability Assessment and Management

Feedback

If you would like to provide feedback for this course, please e-mail the NICCS SO at NICCS@hq.dhs.gov.