17. Monitoring and Logging for Detection of Malicious Activity Lesson Conclusion

Monitoring and Logging for Detection of Malicious Activity Lesson Conclusion Heading

Monitoring and Logging for Detection of Malicious Activity Lesson Conclusion

ND545 C02 L03 A16 Lesson Conclusion V3

Monitoring and Logging for Detection of Malicious Activity Lesson Conclusion Text

Great job on making it through this lesson! You have already learned so much now you can add monitoring and alerting to your skillset!

In the next lesson, we're going to learn about cryptography! Turn to a fresh page in that notepad and let's get into it!

*As a side note, this course is a foundational course that is meant to help build the knowledge to become job-ready, but you will likely need additional training and/or coursework in order to obtain a job in this field. These foundations will set you up for success going forward and are vital to your success in this field. *

Lesson Overview

Lesson Overview

Glossary and Resources

Glossary Terms

Here's a list of all new terms from this lesson:

KeyTerm Definition
PII Personally identifiable information, is any data that could potentially be used to identify a particular person. Examples include a full name, Social Security number, driver's license number, bank account number, passport number, and email address.
Scalability is the ability of a computing system to grow or expand gracefully.
Vulnerability Scanning is an automated threat that uses bots or web crawlers to identify security weaknesses in your website and underlying architecture.
WhoIs WHOIS isn't an acronym, though it may look like one. In fact, it is the system that asks the question, who is responsible for a domain name or an IP address? In other words, it's the contact information for IP addresses and Websites.