Systems and Application Security
Course 7 - Systems and Application Security
This is the seventh course under the specialization SSCP.
This course discusses two major changes in recent years to how we use our data: going mobile and using the cloud. First, we use our data on the go by means of data services provided to our mobile phones, Wi-Fi, and other devices. Second, so many of the enhanced functions we take for granted in our daily personal and professional lives are made possible by cloud services, where our data is stored or processed.
Course 7 Learning Objectives
After completing this course, the participant will be able to:
- Classify different types of malware.
- Determine how to implement malware countermeasures.
- Identify various types of malicious activities.
- Develop strategies for mitigating malicious activities.
- Describe various social engineering methods used by attackers.
- Explain the role of behavior analytics technologies in detecting and mitigating threats.
- Explain the role and functionality of host-based intrusion prevention system (HIPS), host-based intrusion detection system (HIDS), and host-based firewalls.
- Evaluate the benefits of application whitelisting in endpoint device security.
- Explain the concept of endpoint encryption and its role in endpoint security.
- Describe the role and functionality of Trusted Platform Module (TPM) technology in providing hardware-based security features.
- Identify the steps in implementing secure browsing practices using digital certificates and secure communication protocols.
- Explain the concept of endpoint detection and response (EDR) and its role in providing real-time monitoring, detection, investigation, and response capabilities to identify and mitigate advanced threats and security incidents on endpoint devices.
- Identify provisioning techniques for mobile devices.
- Explain the concept of containerization and how it contributes to effective mobile device management.
- E
Watch on Coursera ↗
(saves to browser)
Sign in to unlock AI tutor explanation · ⚡30
More on: Security Basics
View skill →Related AI Lessons
⚡
⚡
⚡
⚡
Stop Blindly Disabling CSRF — Dynamic CSRF Configuration in Spring Security 6
Medium · Cybersecurity
Microsoft Reveals Kazuar Malware’s Advanced Modular Design and Peer-to-Peer Botnet Capabilities
Medium · Cybersecurity
The OpenAI Breach Wasn't About OpenAI – It Was About the 84 Packages Above Them
Dev.to · Dimitris Kyrkos
Years of Apple's Best Security Work, Cracked in Five Days — Here's What Developers Should Know
Dev.to · ArshTechPro
🎓
Tutor Explanation
DeepCamp AI