Log In
0% completed
All Lessons
Free Lessons (3)
Introduction
Course Objectives and Intended Audience
Basics of Security
Introduction: Simplify Security Practices
Use a Risk-based Approach
General Security Concepts
Least Privilege
Separation of Duties
Confidentiality
Integrity
Keep it Simple
Logging
Defense in Depth
Fail Securely
Complete Mediation
Obscurity is Not Security
The Maturity Levels of Security
Challenge — Definitions
Summary: Basics of Security
Detect
Introduction: Detect Cyber Attacks
Continuous Monitoring
Alerts
Security Information and Event Management
Reporting
Network Activity
Vulnerability Scanning
Cyber Intelligence
Indicators of Compromise
Domain Names
IP Addresses, File Hashes, and Email
Challenge — Information Flow
Summary: Detect
Protect
Introduction: Protection from Cyber Attacks
Endpoint Protection
Configuration Management Database
Antivirus
Endpoint Detection and Response
Host-based Intrusion Detection System
Host-based Intrusion Prevention System
File Integrity Checker
Host-based Firewall
Secure Memory
Digital Certificates
Network Protection
Firewalls
Network Intrusion Prevention System
Malware Prevention System
Email Gateway
Internet Proxy
Jump Server
User Awareness and Education
Challenge — OSI Layers
Summary: Protect
Respond
Introduction: Respond to Cyber Attacks
Event Handling
Use Cases
Support Tickets
Incident Response
Data Preservation
Tabletop Exercises and Lessons Learned
Change Management
Challenge—Events
Summary: Respond
Conclusion
Course Summary
Cyber Security Best Practices for Developers
/
...
/
Challenge — Definitions
Challenge — Definitions
Evaluate your understanding of general security concepts.
We'll cover the following...
Missing Cards - Vertical
Place the appropriate definition under the items.
All Cards
1
2
3
4
5
6
7
8
9
10
11
12
Missing Cards
(Drag and drop the cards in the blank spaces)
Reset
Show Solution
Submit
...