Course Description
Explore how Security Incident and Event Monitoring (SIEM), User Behavior Analytics (UBA), and Access Control Lists can be used to prevent data loss or leakage.
Learning Objectives
CEHv10: Pentesting, Laws, and Standards
- describe the types, phases, and methodologies of penetration testing, and how it helps with security assessments
- recognize common security laws, regulations and standards created by industries and government bodies