• Online, Self-Paced
Course Description

Explore how Security Incident and Event Monitoring (SIEM), User Behavior Analytics (UBA), and Access Control Lists can be used to prevent data loss or leakage.

Learning Objectives

CEHv10: Pentesting, Laws, and Standards

  • describe the types, phases, and methodologies of penetration testing, and how it helps with security assessments
  • recognize common security laws, regulations and standards created by industries and government bodies

Framework Connections