System Security Certified Practitioner (SSCP 2018): Malware & Endpoint Security


Overview/Description
Expected Duration
Lesson Objectives
Course Number
Expertise Level



Overview/Description

This 14-video course explores how malware infections occur, and how to mitigate these threats. Learners prepare for the Systems Security Certified Practitioner (SSCP) certification exam by examining how to compare current activity to a baseline. You will examine spyware, which tracks your computing usage with or without your consent, and adware, to direct information to the user. Next, explore rootkits, which stem from replacing UNIX Operating System files in the past with malicious code, and hide their presence. You will examine types of rootkits, including the form of files replaced on the host, running processes in memory, web browser plug-ins, on a Windows platform, or a Windows registry entry. You will examine backdoors which create a hidden entry point for malicious users, and is part of a rootkit. You will explore worms, viruses, and social engineering security threats. This course demonstrates how to configure common Windows Defender settings, and how to use the SCCM (System Center Configuration Manager), and malware policies by using white lists, and locking down USB removable media. 



Expected Duration (hours)
1.0

Lesson Objectives

System Security Certified Practitioner (SSCP 2018): Malware & Endpoint Security

  • Course Overview
  • describe how comparing current activity to a baseline can identify suspicious activity, such as insider threats and data theft attempts
  • explain how trojans can deliver malware such as spyware and adware
  • explain how rootkits, trapdoors, and backdoors work
  • describe how ransomware locks a system or data
  • compare and contrast worms and viruses
  • describe common examples of phishing email messages and how HIDS and host-based firewalls alone cannot protect systems
  • configure Windows Defender settings
  • configure Microsoft System Center Endpoint Protection
  • explain the benefits of whitelisting
  • use Group Policy to configure application blacklists
  • describe how DDoS and botnets present a threat
  • use Microsoft Group Policy to control USB removable media
  • secure end point devices
  • Course Number:
    it_spsscpdj_11_enus

    Expertise Level
    Intermediate