Security School

Get started Bring yourself up to speed with our introductory content.

Top cybersecurity techniques to prevent data breaches

Whether you're managing everyday security operations or doing damage control after a cyberattack, it's vital to understand which tools and technologies can best help you defend against and recover from malicious activity.

Introduction

If there's one axiom that sums up a day in the life of an infosec professional, it might be this: Hope for the best, but prepare for the worst. Are barbarians at the gate -- or perimeter -- every day? Probably not, but the last thing you want to be is ill-equipped when, not if, they do show up. That's why it's imperative to have a broad and deep understanding of cybersecurity techniques and technologies for protecting assets, fending off attacks and recovering from any breaches. These topics are at the heart of the CISSP exam's Domain 7: Security Operations.

In this Security School, based on (ISC)² CISSP training material for Domain 7, learn about the various tools and best practices for building up your defenses, detecting suspicious behavior and responding to malicious activity. In his video, expert Adam Gordon provides a comprehensive look at intrusion detection and prevention systems and their complementary technologies. In addition, Gordon reviews cybersecurity techniques such as sandboxing, the use of honeypots and dynamic security application testing in his tip. 

Once you've reviewed the parts of this Security School on these essential cybersecurity techniques and tools, take the quiz to see how much you have learned about preventing unauthorized access, evading attackers, isolating infected resources and more.

CISSP® is a registered mark of (ISC)².

View our Security School Course Catalog to view more schools.

1Learning links-

Cybersecurity techniques and technologies to protect IT resources

Can't tell the difference between a sandbox and a honeypot? The following resources will familiarize you with these cybersecurity techniques and other foundations of security operations.

Video

Network intrusion detection systems ID threats

Learn how to stop threats before they turn into real danger. Expert Adam Gordon provides a deep dive into tools and technologies that should be in every infosec pro's back pocket. Continue Reading

Tip

Dynamic application security testing, honeypots hunt malware

Stealth is an attacker's best friend, especially when it comes to sneaking malware past the firewall. Learn about some trusty tools that can stop malware in its tracks. Continue Reading

Quiz

Get ready for CISSP Domain 7: Cyberattack prevention quiz

Do you know what it takes to stop bad guys in their tracks? Find out with this practice quiz on cybersecurity methods and tools used to thwart or recover from an attack. Continue Reading

Start the conversation

Send me notifications when other members comment.

Please create a username to comment.

-ADS BY GOOGLE

SearchCloudSecurity

SearchNetworking

SearchCIO

SearchEnterpriseDesktop

SearchCloudComputing

ComputerWeekly.com

Close