이 강좌에 대하여

최근 조회 5,980
공유 가능한 수료증
완료 시 수료증 획득
100% 온라인
지금 바로 시작해 나만의 일정에 따라 학습을 진행하세요.
다음 특화 과정의 6개 강좌 중 6번째 강좌:
유동적 마감일
일정에 따라 마감일을 재설정합니다.
초급 단계
완료하는 데 약 16시간 필요
영어
공유 가능한 수료증
완료 시 수료증 획득
100% 온라인
지금 바로 시작해 나만의 일정에 따라 학습을 진행하세요.
다음 특화 과정의 6개 강좌 중 6번째 강좌:
유동적 마감일
일정에 따라 마감일을 재설정합니다.
초급 단계
완료하는 데 약 16시간 필요
영어

제공자:

Placeholder

(ISC)²

강의 계획 - 이 강좌에서 배울 내용

1

1

완료하는 데 5시간 필요

Identify and Analyze Malicious Code and Activity

완료하는 데 5시간 필요
18개 동영상 (총 109분), 18 개의 읽기 자료, 1 개의 테스트
18개의 동영상
Malicious Code and Activity: Key Concepts6m
Malicious Code and Activity: Malicious Code Countermeasures4m
Malicious Code and Activity: Software Exploitation Methods6m
Malicious Code and Activity: Software Exploitation Methods5m
Malicious Code and Activity: Code Signing5m
Malicious Code and Activity: Social Engineering6m
Malicious Code and Activity: Security Awareness Training6m
Malicious Code and Activity: Long File Extensions5m
Malicious Code and Activity: E-mail7m
Malicious Code and Activity: Countermeasures5m
Malicious Code and Activity: Examples of Spoofing5m
Malicious Code and Activity: Techniques5m
Malicious Code and Activity: Botnet-Led Exploits6m
Malicious Code and Activity: Malicious Web Activity6m
Malicious Code and Activity: Zero-Day Exploits4m
Malicious Code and Activity: Infected Factory Builds and Media4m
Malicious Code and Activity: Inspection of Processes7m
18개의 읽기 자료
Systems and Application Security10m
Malicious Code and Activity: Key Concepts10m
Malicious Code and Activity: Malicious Code Countermeasures10m
Malicious Code and Activity: Software Exploitation Methods10m
Malicious Code and Activity: Software Exploitation Methods10m
Malicious Code and Activity: Code Signing10m
Malicious Code and Activity: Social Engineering10m
Malicious Code and Activity: Security Awareness Training10m
Malicious Code and Activity: Long File Extensions10m
Malicious Code and Activity: E-mail10m
Malicious Code and Activity: Countermeasures10m
Malicious Code and Activity: Examples of Spoofing10m
Malicious Code and Activity: Techniques10m
Malicious Code and Activity: Botnet-Led Exploits10m
Malicious Code and Activity: Malicious Web Activity10m
Malicious Code and Activity: Zero-Day Exploits10m
Malicious Code and Activity: Infected Factory Builds and Media10m
Malicious Code and Activity: Inspection of Processes10m
1개 연습문제
Quiz 130m
2

2

완료하는 데 1시간 필요

Implement and Operate Endpoint Device Security

완료하는 데 1시간 필요
3개 동영상 (총 15분), 3 개의 읽기 자료, 1 개의 테스트
3개의 동영상
Endpoint Device Security: Trusted Platform Module (TPM)6m
Endpoint Device Security: BYOD Policy Considerations2m
3개의 읽기 자료
Endpoint Device Security: HIDS10m
Endpoint Device Security: Trusted Platform Module (TPM)10m
Endpoint Device Security: BYOD Policy Considerations10m
1개 연습문제
Quiz 230m
3

3

완료하는 데 5시간 필요

Operate and Configure Cloud Security

완료하는 데 5시간 필요
16개 동영상 (총 105분), 16 개의 읽기 자료, 1 개의 테스트
16개의 동영상
Cloud Security: Hybrid5m
Cloud Security: Virtualization7m
Cloud Security: Hypervisor4m
Cloud Security: Country-Specific Legal Considerations6m
Cloud Security: P&DP Laws6m
Cloud Security:Application of Defined Controls for Personally Identifiable Information (PII)8m
Cloud Security: Data Dispersion5m
Cloud Security: Threat to Storage Types9m
Cloud Security: Technologies to Address Threats4m
Cloud Security: DLP Architecture7m
Cloud Security: Review Activity6m
Cloud Security: Key Storage in the Cloud4m
Cloud Security: Common Approaches for Data Masking4m
Cloud Security: Data Retention Policies7m
Cloud Security: Disposal Options8m
16개의 읽기 자료
Cloud Security: Five Essential Characteristics of Clouds10m
Cloud Security: Hybrid10m
Cloud Security: Virtualization10m
Cloud Security: Hypervisor10m
Cloud Security: Country-Specific Legal Considerations10m
Cloud Security: P&DP Laws10m
Cloud Security: Application of Defined Controls for Personally Identifiable Information (PII)10m
Cloud Security: Data Dispersion10m
Cloud Security: Threat to Storage Types10m
Cloud Security: Technologies to Address Threats10m
Cloud Security: DLP Architecture10m
Cloud Security: Review Activity10m
Cloud Security: Key Storage in the Cloud10m
Cloud Security: Common Approaches for Data Masking10m
Cloud Security: Data Retention Policies10m
Cloud Security: Disposal Options10m
1개 연습문제
Quiz 330m
4

4

완료하는 데 3시간 필요

Secure Big Data Systems & Operate and Secure Virtual Environments

완료하는 데 3시간 필요
9개 동영상 (총 70분), 9 개의 읽기 자료, 1 개의 테스트
9개의 동영상
Secure Big Data Systems: Interpreting Big Data4m
Secure Big data Systems: Key Challenges5m
Operate and Secure Virtual Environments: SDN5m
Operate and Secure Virtual Environments: Virtual Appliances8m
Operate and Secure Virtual Environments: DRS10m
Operate and Secure Virtual Environments: Common Attacks6m
Operate and Secure Virtual Environments: Network Security5m
Operate and Secure Virtual Environments: Virtual Machine Security16m
9개의 읽기 자료
Secure Big Data Systems: Big Data10m
Secure Big Data Systems: Interpreting Big Data10m
Secure Big data Systems: Key Challenges10m
Operate and Secure Virtual Environments: SDN10m
Operate and Secure Virtual Environments: Virtual Appliances10m
Operate and Secure Virtual Environments: DRS10m
Operate and Secure Virtual Environments: Common Attacks10m
Operate and Secure Virtual Environments: Network Security10m
Operate and Secure Virtual Environments: Virtual Machine Security10m
1개 연습문제
Quiz 430m

검토

SYSTEMS AND APPLICATION SECURITY의 최상위 리뷰

모든 리뷰 보기

(ISC)² Systems Security Certified Practitioner (SSCP) 정보

(ISC)² Systems Security Certified Practitioner (SSCP)

자주 묻는 질문

궁금한 점이 더 있으신가요? 학습자 도움말 센터를 방문해 보세요.