• Online, Self-Paced
Course Description

Explore how Security Incident and Event Monitoring (SIEM), User Behavior Analytics (UBA), and Access Control Lists can be used to prevent data loss or leakage.

Learning Objectives

CEHv10: Security Controls Part 2

  • develop an incident management and response procedure and describe SIEM and UBA
  • describe access controls, the different types of access control mechanisms, data leakage, leak prevention, and data loss prevention

Framework Connections

Feedback

If you would like to provide feedback for this course, please e-mail the NICCS SO at NICCS@hq.dhs.gov.