Explore how Security Incident and Event Monitoring (SIEM), User Behavior Analytics (UBA), and Access Control Lists can be used to prevent data loss or leakage.
CEHv10: Pentesting, Laws, and Standards
- describe the types, phases, and methodologies of penetration testing, and how it helps with security assessments
- recognize common security laws, regulations and standards created by industries and government bodies
If you would like to provide feedback for this course, please e-mail the NICCS SO at NICCS@hq.dhs.gov.