Description: Malicious attacks on systems and applications are now an everyday problem, and security professionals have to know how to identify and protect against them. This course covers how to identify and analyze malicious activity, including malicious code and countermeasures. It also outlines best practices for endpoint device and cloud security, including host-based firewalls, HIDS, virtualization, and service models. In this course, you will learn about best practices for securing big data systems and operating and securing virtual environments, including appliance and attack countermeasures. This course is one of a series in the Skillsoft learning path that covers the objectives for the (ISC)2 Systems Security Certified Practitioner Exam.
Target Audience: Individuals interested in the (ISC)2 Systems Security Certified Practitioner exam; security professionals interested in acquiring new skills and knowledge in security best practices
Duration: 02:06
Description: Enterprise networks and telecommunications technology, while vital, come with their own unique security challenges. This course introduces network security best practices for OSI and TCP/IP models, as well as common ports and protocols. It also covers common communication network attacks and countermeasures, as well as network access control best practices. In this course, you will learn about secure practices for managing LAN-based, network-based, and wireless platforms technologies. This course is one of a series in the Skillsoft learning path that covers the objectives for the (ISC)2 Systems Security Certified Practitioner exam.
Target Audience: Individuals interested in the (ISC)2 Systems Security Certified Practitioner exam; security professionals interested in acquiring new skills and knowledge in security best practices
Duration: 01:42
Description: Enterprise assets, including data, must be protected at all times, including when stored, accessed, shared, and transmitted. This course provides an overview of cryptography best practices, including hashing, salting, encryption, and digital signature usage. It also covers cryptography regulatory requirements and best practices for implementing and operating cryptographic systems, including PKI and Web of Trust. This course is one of a series in the Skillsoft learning path that covers the objectives for the (ISC)2 Systems Security Certified Practitioner Exam.
Target Audience: Individuals interested in the (ISC)2 Systems Security Certified Practitioner exam; security professionals interested in acquiring new skills and knowledge in security best practices
Duration: 01:04
Description: Despite your best efforts, security incidents will happen, and it's important you know how to properly respond and recover to protect enterprise assets. This course covers incident handling best practices, including discovery, escalation, reporting, and response. It also details appropriate countermeasures and continuity practices in addition to an overview of forensic investigation best practices, including appropriate evidence handling and chain of custody activities. This course is one of a series in the Skillsoft learning path that covers the objectives for the (ISC)2 Systems Security Certified Practitioner Exam.
Target Audience: Individuals interested in the (ISC)2 Systems Security Certified Practitioner exam; security professionals interested in acquiring new skills and knowledge in security best practices
Duration: 00:58
Description: Identifying, evaluating, and prioritizing potential threats to the organization's network and systems are critical for proper IT systems security. This course introduces the risk management process, including risk assessment, treatment, and assessment activities. It also details best practices for operating and maintaining monitoring systems, and analyzing monitoring results using security analytics, metrics, and trends. This course is one of a series in the Skillsoft learning path that covers the objectives for the (ISC)2 Systems Security Certified Practitioner Exam.
Target Audience: Individuals interested in the (ISC)2 Systems Security Certified Practitioner exam; security professionals interested in acquiring new skills and knowledge in security best practices
Duration: 00:56
Description: Appropriate IT asset management is a critical element of an overall IT security administration approach. This course covers hardware, software, and data asset management best practices. It also includes best practices for implementing compliance, participating in change management activities, and conducting security awareness and training in the enterprise. This course is one of a series in the Skillsoft learning path that covers the objectives for the (ISC)2 Systems Security Certified Practitioner Exam.
Target Audience: Individuals interested in the (ISC)2 Systems Security Certified Practitioner exam; security professionals interested in acquiring new skills and knowledge in security best practices
Duration: 00:55
Description: The day-to-day operation of enterprise computer systems and the data they host requires a solid understanding of appropriate security practices. This course covers fundamental security concepts including complying with codes of ethics, confidentiality, integrity, and availability. The course also covers the concepts of privacy, accountability, and non-repudiation, as well as security controls documentation and operation best practices. This course is one of a series in the Skillsoft learning path that covers the objectives for the (ISC)2 Systems Security Certified Practitioner Exam.
Target Audience: Individuals interested in the (ISC)2 Systems Security Certified Practitioner exam; security professionals interested in acquiring new skills and knowledge in security best practices
Duration: 00:50
Description: Access controls are the modern-day security guards of your overall systems and network. In this course, you will learn about authentication mechanisms including single and multifactor authentication. You'll also learn about trust architectures, including one-way, two-way, and transitive trust relationships. This course also covers the identity management life cycle, and specific access controls such as mandatory, non-discretionary, role-based, and attribute-based controls. This course is one of a series in the Skillsoft learning path that covers the objectives for the (ISC)2 Systems Security Certified Practitioner Exam.
Target Audience: Individuals interested in the (ISC)2 Systems Security Certified Practitioner exam; security professionals interested in acquiring new skills and knowledge in security best practices
Duration: 01:03