If there's one axiom that sums up a day in the life of an infosec professional, it might be this: Hope for the best, but prepare for the worst. Are barbarians at the gate -- or perimeter -- every day? Probably not, but the last thing you want to be is ill-equipped when, not if, they do show up. That's why it's imperative to have a broad and deep understanding of cybersecurity techniques and technologies for protecting assets, fending off attacks and recovering from any breaches. These topics are at the heart of the CISSP exam's Domain 7: Security Operations.
In this Security School, based on (ISC)² CISSP training material for Domain 7, learn about the various tools and best practices for building up your defenses, detecting suspicious behavior and responding to malicious activity. In his video, expert Adam Gordon provides a comprehensive look at intrusion detection and prevention systems and their complementary technologies. In addition, Gordon reviews cybersecurity techniques such as sandboxing, the use of honeypots and dynamic security application testing in his tip.
Once you've reviewed the parts of this Security School on these essential cybersecurity techniques and tools, take the quiz to see how much you have learned about preventing unauthorized access, evading attackers, isolating infected resources and more.
CISSP® is a registered mark of (ISC)².
View our Security School Course Catalog to view more schools.
Cybersecurity techniques and technologies to protect IT resources
Can't tell the difference between a sandbox and a honeypot? The following resources will familiarize you with these cybersecurity techniques and other foundations of security operations.
Stealth is an attacker's best friend, especially when it comes to sneaking malware past the firewall. Learn about some trusty tools that can stop malware in its tracks. Continue Reading
Do you know what it takes to stop bad guys in their tracks? Find out with this practice quiz on cybersecurity methods and tools used to thwart or recover from an attack. Continue Reading