Time
33 hours 23 minutes
Difficulty
Beginner
CEU/CPE
33

Video Transcription

00:00
Hello and welcome back. The cyber is 2019 comp t A Security plus certification preparation course
00:08
we continue on with this particular module, which is martyr to, and the topic of discussion will be domain to technologies and tools.
00:17
We have a brand new objective to discuss during this particular video, which is tied at 2.4. Giving a scenario.
00:25
Analyze and interpret output from security technologies.
00:28
This brings to our first pre assessment quiz or question
00:32
what you need to determine here at this point. Time. Determine whether this statement here is either true
00:37
or is it, in fact, false.
00:40
And it reads as follows. A file interviewed checker can determine whether foul has been altered by an application or is corrupt.
00:49
Is that true or false?
00:52
If you send a chill, you're absolutely correct.
00:56
As mentioned earlier, we begin in a brand new again objective here,
01:00
and its title. Given us an error. Analyze interpret output from security technology. He again other sub topics of interest, which will be discussing doing this particular video, ranging from host based intrusion Texas system. It was prevention system all way down to the topic Off patch management,
01:21
her again and some of dis objectives. Taking a look at U T M
01:25
A DLP data loss prevention data execution prevention as well as Web application type firewall.
01:32
The first item we will take a look is called
01:34
a whole Space intrusion detection system versus a host base and choosing to prevention system obviously, deaths of differences when you think about the to.
01:44
In fact, we think about a host base intrusion detection system. It's in choosing the Texans system that is incapable of monitoring and analyzing the internal kernels of a computer system as well as the network packages on the network interface.
01:57
Your host Base Intrusion prevention system is a system or program implored to protect critical computer systems containing critical data against viruses and other intimate male wear.
02:10
A foul integrity check
02:13
can, obviously what it can do. It could determine whether foul that you have has what had been altered by an application or, in fact, whether or not that file is deemed to be corrupt.
02:23
Ah, whole space firewall is a power that's built into your desktop operations, such as your Wonder Stand operating system.
02:31
A host based Fowler typically output three things alerts update. Martin notification as well as your logs
02:40
application. White listing.
02:43
Basically, it determines the rules
02:46
on which advocates allowed to be run on a computer. We can add application X, Cuba file names or DLL. Buying their is to that particular whiteness
02:55
now. Whiteness application. Typically, do not go through a security check up on launch. In some cases, only white listed application this case can run.
03:06
Then we have removable media control.
03:08
I had a very high risk, as it's easier still data you lies in these what we call removal media, ranging from your serial. Parallel your firewall fire while your USB, Bluetooth and so forth.
03:23
There we come to the topical advanced mayor. Well, twos.
03:28
The utilization of advanced network can analyze theater tack life cycle and glean important forensic details to enhance their threat. Intelligence
03:38
Mirror to move. Put whether they find marijuana as well as where they were able to remove, block or quarantine. That Manuel
03:46
Another process that we opted to be engaged in what we call patch management
03:52
now Patch manager tools. Basically, a patch is a set of changes to your computer program or supporting data designed to update, fix
04:00
or improve it
04:03
now Patch Man's where your updates are downloaded that tested on an isolated system such as a sandbox in which we discuss it later on what that entails and when they have been thoroughly tested, their then road out to your I T system. This is sure that the I t system have no vulnerabilities,
04:19
so really, what, you want a sandbox that before, before you actually roll it out? You wanna test that, obviously,
04:25
in a virtual type environment, whether in your production environment,
04:29
then we have a U. T. M. With stands for Unified Threat Management, which is again, is a firewall that can also prevent your l feel to another word. Universal resource filtering content filter in the world as male, where inspection
04:43
When you combine the solution. Some network features into a single device that provides a network based security such as proxy, reverse proxy and firewall. You can turn on very verbose logging, reviewed log files and trumps your rules. As part of your troubleshooting type scenario,
05:00
DLP stand for data loss prevention basis, a scrappage of making sure that in use that do not send out that system or critical information outside of your corporate network. The term also is used to describe software products. They help a network minister to control what data and uses, in fact, that they can transfer
05:19
data execution prevention. That this is a security feature can help prevent damage to your computer from viruses and other security type threats. This again, this is a technology and protect your memory for malicious code. There's, ah, hardware based type, what we call the data execution prevention and on software based one as well.
05:38
You can predict individual application would again with
05:41
with data execution prevention. Or you could protect an entire computer as well.
05:46
Web Application Firewall
05:48
basis. An application filed for HCP application. It applies a set of rules to an http type conversation.
05:57
At this point in time, we have ah post assessment quiz,
06:00
and this, in fact, is a chew off false statement.
06:03
What you need to do is determine whether or not it's either true or false.
06:08
So the statement reasons follows. Host Base Firewall is an application foul that's not built into the desktop operating systems such as Windows 10 operating system.
06:23
The correct response have been falls because of a host base. Firewall is in fact, an application firewall that's built into the desktop operations of such a Windows 10 operating system.
06:34
This brings us to our key takeaways from this particular video, and they are as follows. We learned that a unified threat management, or UTF, is a foul that can also prevent Uriel filtering content. Hilton, as well as mayor, worked inspection.
06:49
We also learned that at patches sort of changes to a computer program or supporting data designed to update, fix or improve it.
06:58
We also learned that removing media are at very high security risk, as is easy to steal data using these particular type of media,
07:08
we learned the application whiteness and determines the rules on what applicants allow to run on a computer.
07:15
We learned also that a unified threat management, or you tm
07:18
is a firewall that can also prevent Azeri mentioned prevent Iorio type filter in as well,
07:25
and our upcoming video will be moving on to a brand new objective, which, indeed within margin number two. We just title 2.5, giving a scenario deplore mobile devices securely
07:38
look for the Syrian. The very next video

Up Next

CompTIA Security+

Interested in the cybersecurity industry? The CompTIA Security+ is the gold standard for those looking to enter the cybersecurity industry. Join thousands of professionals who have gained this certification through this course and launched their careers in information security.

Instructed By

Instructor Profile Image
Jim Hollis
Independent Contractor
Instructor