File integrity monitoring systems watch the file system of an endpoint or server for any unexpected changes and report those changes to an administrator for further investigation. In this video, Mike Chapple explains how file integrity monitoring systems
- [Presenter] File integrity monitoring…is an important component of a defense…in depth approach to information security.…We use many different defenses designed…to keep end point systems safe.…Anti-virus software is designed to detect malicious files…before they gain a foothold on end points.…Centralized, multi-factor authentication…prevents attempts to compromise user accounts.…Host intrusion detection and prevention systems…alert us to potential compromises and block them.…
However, the principle of defense in depth suggests…that we should have controls in place…that can help us detect an intrusion…even when those other systems might fail.…File integrity monitoring is a great example…of this type of control.…File integrity monitoring systems watch the file system…of an endpoint or server for any unexpected changes,…and then report those changes…to an administrator for further investigation.…They perform this function by using…cryptographic hash functions.…
Hash functions take an input of any size…and transform it into a unique, cryptographic hash value.…
Author
Released
10/10/2017We are a CompTIA Partner. As such, we are able to offer CompTIA exam vouchers at a 10% discount. For more information on how to obtain this discount, please download these PDF instructions.
- IP addresses
- ICMP
- Routers, switches, and bridges
- Firewalls
- VPNs and VPN concentrators
- Network intrusion detection and prevention
- Managing secure networks
- Tuning and configuring SIEMs
- Troubleshooting digital certificates
- Personnel, host, and mobile device security
- Mobile device management and tracking
- Securing common protocols
Skill Level Beginner
Duration
Views
Related Courses
-
Insights from a Cybersecurity Professional
with Mike Chapple32m 15s Intermediate
-
Introduction
-
Welcome1m 37s
-
-
1. TCP/IP Suite
-
Introducing TCP/IP5m 20s
-
IP addresses3m 26s
-
Domain name service4m 6s
-
Network ports3m 42s
-
ICMP3m 29s
-
-
2. Network Security Devices
-
Firewalls4m 17s
-
Proxies3m 3s
-
Load balancers4m 44s
-
VPNs and VPN concentrators4m 43s
-
IPsec3m 17s
-
Unified threat management1m 57s
-
OpenID Connect3m 24s
-
3. Managing Secure Networks
-
Firewall rule management4m 41s
-
Network monitoring4m 19s
-
SNMP3m 18s
-
Storage networks3m 8s
-
-
4. Wireless Networking
-
Wireless networking3m 50s
-
Basic wireless security3m 45s
-
WEP, WPA, and WPA21m 44s
-
Wireless authentication5m 7s
-
Wireless signal propagation2m 47s
-
-
5. Security and Monitoring Technologies
-
Tuning and configuring SIEMs3m 49s
-
Data loss prevention7m 4s
-
Network access control5m 34s
-
Mail gateways3m 7s
-
Data sanitization tools4m 11s
-
Steganography4m 55s
-
6. Security Assessment Tools
-
Protocol analyzers9m 17s
-
Network scanning7m 15s
-
Exploitation frameworks7m 14s
-
Command line network tools14m 50s
-
DNS harvesting5m 23s
-
-
7. Security Troubleshooting
-
8. Personnel Security
-
Personnel security3m 7s
-
Employee termination process2m 42s
-
Employee privacy2m 23s
-
Social networking3m 52s
-
Personnel safety2m 31s
-
-
9. Host Security
-
Operating system security9m 22s
-
Malware prevention10m 25s
-
Application management6m 38s
-
File integrity monitoring6m 46s
-
Removable media control3m 42s
-
Data execution prevention2m 17s
-
-
10. Mobile Device Security
-
Mobile connection methods4m 39s
-
Mobile device security2m 35s
-
Mobile device management7m 7s
-
Mobile device tracking3m 28s
-
Mobile application security5m 31s
-
Mobile security enforcement4m 14s
-
Bring your own device4m 47s
-
Mobile deployment models3m 31s
-
-
11. Securing Protocols
-
TLS and SSL4m 1s
-
Securing common protocols6m 30s
-
Cryptographic hardware4m 8s
-
-
Conclusion
-
Next steps37s
-
- Mark as unwatched
- Mark all as unwatched
Are you sure you want to mark all the videos in this course as unwatched?
This will not affect your course history, your reports, or your certificates of completion for this course.
CancelTake notes with your new membership!
Type in the entry box, then click Enter to save your note.
1:30Press on any video thumbnail to jump immediately to the timecode shown.
Notes are saved with you account but can also be exported as plain text, MS Word, PDF, Google Doc, or Evernote.
Share this video
Embed this video
Video: File integrity monitoring