BACKGROUND IMAGE: iSTOCK/GETTY IMAGES
Network intrusion detection systems ID threats
Learn how to stop threats before they turn into real danger. Expert Adam Gordon provides a deep dive into tools and technologies that should be in every infosec pro's back pocket. Watch Now
If there's one axiom that sums up a day in the life of an infosec professional, it might be this: Hope for the best, but prepare for the worst. Are barbarians at the gate -- or perimeter -- every day? Probably not, but the last thing you want to be is ill-equipped when, not if, they do show up. That's why it's imperative to have a broad and deep understanding of cybersecurity techniques and technologies for protecting assets, fending off attacks and recovering from any breaches. These topics are at the heart of the CISSP exam's Domain 7: Security Operations.
In this Security School, based on (ISC)² CISSP training material for Domain 7, learn about the various tools and best practices for building up your defenses, detecting suspicious behavior and responding to malicious activity. In his video, expert Adam Gordon provides a comprehensive look at intrusion detection and prevention systems and their complementary technologies. In addition, Gordon reviews cybersecurity techniques such as sandboxing, the use of honeypots and dynamic security application testing in his tip.
Once you've reviewed the parts of this Security School on these essential cybersecurity techniques and tools, take the quiz to see how much you have learned about preventing unauthorized access, evading attackers, isolating infected resources and more.
CISSP® is a registered mark of (ISC)².
View our Security School Course Catalog to view more schools.