From the course: CISSP Cert Prep (2021): 7 Security Operations

Unlock the full course today

Join today to access over 22,500 courses taught by industry experts or purchase this course individually.

Endpoint monitoring

Endpoint monitoring

From the course: CISSP Cert Prep (2021): 7 Security Operations

Start my 1-month free trial

Endpoint monitoring

- [Instructor] We have a tremendous number of diverse computing end points throughout our organizations. In addition to the many desktop and laptop computers used by individuals and servers in our data centers in the cloud, we have mobile devices, internet of things sensors and many other network enabled devices on our networks. These end points are often the first target of attackers seeking to penetrate our defenses. They target relatively unprotected end points in the hope that they will be able to use that access as the jumping off point for a larger attack. This makes monitoring these end points a crucial task for cybersecurity analysts. This monitoring should begin with the basics. Organizations are likely already monitoring processor activity, memory consumption and file system activity for signs of operational issues. These same metrics can provide important security insight as well. For example, unexplained spikes…

Contents