From the course: CCSP Cert Prep: 5 Cloud Security Operations Audio Review
Unlock the full course today
Join today to access over 22,600 courses taught by industry experts or purchase this course individually.
Threat assessment
From the course: CCSP Cert Prep: 5 Cloud Security Operations Audio Review
Threat assessment
- [Instructor] The world is full of an overwhelming number of cybersecurity threats, so we need a structured way to approach them. In Chapter 7, I covered threat assessment techniques. We talked about the tools used to conduct threat assessments and how they can be either active or passive. Active tools engage directly with components of our technology environment, testing them for vulnerabilities and other issues. Passive tools simply observe what they can see on the network, watching for anomalies. One of these tools is a protocol analyzer. It's a passive tool that watches network traffic and allows us to inspect the contents of packets that traverse our networks. Honeypots are an active threat assessment tool. They're systems that are designed to look appealing to attackers and deliberately attract their attention. When someone attempts to attack a honeypot, the honeypot records their activity for analysis.…
Contents
-
-
-
(Locked)
Physical and logical infrastructure2m 54s
-
(Locked)
Physical and logical infrastructure: Q&A2m
-
(Locked)
Secure infrastructure operations2m 50s
-
(Locked)
Secure infrastructure operations: Q&A1m 18s
-
(Locked)
Network operations2m 36s
-
(Locked)
Network operations: Q&A1m 11s
-
(Locked)
Network security2m 28s
-
(Locked)
Network security: Q&A1m 51s
-
(Locked)
Security baselines and standards2m 32s
-
(Locked)
Security baselines and standards: Q&A1m 39s
-
(Locked)
Monitoring2m 11s
-
(Locked)
Monitoring: Q&A1m 37s
-
(Locked)
Threat assessment2m 10s
-
(Locked)
Threat assessment: Q&A1m 35s
-
(Locked)
Incident management1m 47s
-
(Locked)
Incident management: Q&A1m 23s
-
(Locked)
Investigations and forensics1m 51s
-
(Locked)
Investigations and forensics: Q&A1m 25s
-
(Locked)
-