Security Techniques (OBJ. )
Security Techniques
- Protecting digital assets from evolving cyber threats
- Scope
- Traditional to advanced security techniques
Study Topics
- Wireless Infrastructure Security
- Significance of wireless networks
- Challenges and security considerations
- Wireless Security Settings
- WPA3, AAA/RADIUS, Cryptographic protocols
- Authentication protocols in wireless security
- Application Security
- Input validation, secure cookies
- Static and dynamic code analysis
- Code signing and sandboxing
- Network Access Control (NAC)
- Purpose and functionality of NAC
- Policy enforcement on devices and users
- Web and DNS Filtering
- Agent-based web filters, centralized proxy
- URL scanning, content categorization, block rules
- Reputation-based filtering
- Email Security
- DMARC, DKIM, SPF protocols
- Gateway protocol and spam filtering techniques
- Endpoint Detection and Response (EDR)
- Continuous monitoring of endpoint devices
- Identifying, investigating, and preventing cyber threats
- User Behavior Analytics (UBA)
- Leveraging machine learning and data analytics
- Identifying potentially harmful activities
- Detection of anomalies or deviations
- Selecting Secure Protocols
- Protocol selection, port selection
- Transport method selection