O'Reilly logo

SSCP Systems Security Certified Practitioner All-in-One Exam Guide, Second Edition, 2nd Edition by Darril Gibson

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

CHAPTER 8

Monitoring and Analysis

In this chapter, you will learn about

•  Intrusion detection systems

•  Security alerts and false positives

•  Differences between network-based and host-based intrusion detection systems

•  Differences between intrusion detection systems and intrusion prevention systems

•  Methods of detecting and preventing attacks

•  File integrity checkers

•  Honeypots, honeynets, and padded cells

•  Security event management tools used in large networks

•  Vulnerability assessment test types

•  Vulnerability assessment tools

•  Penetration testing

Operating and Maintaining Monitoring Systems

Monitoring systems within an information technology (IT) network helps to prevent, detect, and correct potential security incidents. ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required