• Online, Self-Paced
Course Description

Malicious attacks on systems and applications are now an everyday problem, and security professionals have to know how to identify and protect against them. This course covers how to identify and analyze malicious activity, including malicious code and countermeasures. It also outlines best practices for endpoint device and cloud security, including host-based firewalls, HIDS, virtualization, and service models. In this course, you will learn about best practices for securing big data systems and operating and securing virtual environments, including appliance and attack countermeasures. This course is one of a series in the Skillsoft learning path that covers the objectives for the (ISC)2 Systems Security Certified Practitioner Exam.

Learning Objectives

Identifying and Analyzing Malicious Activity

  • start the course
  • describe characteristics of malicious code
  • identify countermeasures for mitigating risk and damage from malicious code
  • distinguish between different types of malicious activity
  • identify countermeasures for mitigating risk and damage from malicious activity

Operating Endpoint Device Security

  • use HIDS for endpoint device security
  • use host-based firewalls for endpoint device security
  • use application whitelisting for endpoint device security
  • use endpoint encryption for endpoint device security
  • use trusted platform module for endpoint device security
  • use mobile device management for endpoint device security
  • identify secure browsing best practices for endpoint device security

Operating and Configuring Cloud Security

  • distinguish between cloud security operation models
  • distinguish between cloud security service models
  • describe characteristics of cloud virtualization
  • identify the legal and privacy concerns associated with cloud security
  • identify secure data storage and transmission options for cloud security
  • identify security requirements when outsourcing cloud services

Securing Big Data Systems

  • identify application vulnerabilities that apply to big data systems
  • identify architecture and design vulnerabilities that apply to big data systems

Operating and Securing Virtual Environments

  • describe best practices for secure software-defined networking in virtual environments
  • identify characteristics and role of hypervisors in virtual environments
  • describe characteristics of virtual appliances and their role in virtual environments
  • describe continuity and resilience in secure virtual environments
  • identify the most common attacks on virtual environments and countermeasures for mitigating risk and damage
  • describe best practices for shared storage in virtual environments

Practice: Systems & Applications Security

  • describe best practices for implementing and operating systems and application security

Framework Connections

The materials within this course focus on the Knowledge Skills and Abilities (KSAs) identified within the Specialty Areas listed below. Click to view Specialty Area details within the interactive National Cybersecurity Workforce Framework.