Malicious attacks on systems and applications are now an everyday problem, and security professionals have to know how to identify and protect against them. This course covers how to identify and analyze malicious activity, including malicious code and countermeasures. It also outlines best practices for endpoint device and cloud security, including host-based firewalls, HIDS, virtualization, and service models. In this course, you will learn about best practices for securing big data systems and operating and securing virtual environments, including appliance and attack countermeasures. This course is one of a series in the Skillsoft learning path that covers the objectives for the (ISC)2 Systems Security Certified Practitioner Exam.
Individuals interested in the (ISC)2 Systems Security Certified Practitioner exam; security professionals interested in acquiring new skills and knowledge in security best practices