Explore how Security Incident and Event Monitoring (SIEM), User Behavior Analytics (UBA), and Access Control Lists can be used to prevent data loss or leakage.
CEHv10: Security Controls Part 2
- develop an incident management and response procedure and describe SIEM and UBA
- describe access controls, the different types of access control mechanisms, data leakage, leak prevention, and data loss prevention
If you would like to provide feedback for this course, please e-mail the NICCS SO at NICCS@hq.dhs.gov.