Certified Information Systems Auditor (CISA) 2019: Testing & Vulnerability
Expert
- 16 videos | 1h 4m 15s
- Includes Assessment
- Earns a Badge
This course covers material necessary to take the ISACA CISA (Certified Information Systems Auditor) exam, and explores auditor responsibilities such as identifying network and host weaknesses, reporting them to stakeholders, and suggesting recommendations to improve an organization's security. Learn to distinguish between white, black, and gray box testing, and then explore the benefits of periodic scans for identifying vulnerabilities. Learn how to use pen tests, and evaluate environmental and physical security controls. Next, learn how to use Nessus, a free remote security scanning tool. This course demonstrates how to forge TCP (transmission control protocol) network traffic by using the hping3 tool in Kali Linux. This course demonstrates the OWASP (open-source web application security scanner) ZAP (zed attack proxy) tool to identify web app vulnerabilities. You will learn how to secure traffic by using IPSec (internet security protocol), configure a cloud-based jump box, and about honey pots. Next, learn to secure assets with physical controls and the eavesdropping risk of drones. Finally, learners will be able to identify different types of fire suppression systems.
WHAT YOU WILL LEARN
-
Discover the subject areas covered in this courseDistinguish between white, gray, and black-box testingRecall the benefits of periodic vulnerability scans and awareness of cvesUse the free nessus tool to execute a vulnerability scanCompare baseline and current network scans to identify changesDescribe the pen test procedure from reconnaissance to exploiting vulnerabilitiesForge network traffic using hping3 in kali linuxUse owasp zap to scan a web site for vulnerabilities
-
Analyze ipsec network trafficConfigure a cloud-based jump box to allow access to internal hostsRecognize where honeypots can be used to monitor malicious trafficConsider potential business process risks related to heating, ventilation, and air conditioningDescribe methods of securing assets using physical controlsDescribe how drones can present eavesdropping and other risksIdentify different types of fire suppressionDifferentiate between vulnerability and penetration testing, describe the purpose of a jump box, list physical security examples, and perform a non-credentialed vulnerability scan
IN THIS COURSE
-
2m 44s
-
4m 12sIn this video, you will learn how to distinguish between white, gray, and black-box testing. FREE ACCESS
-
3m 36sAfter completing this video, you will be able to recall the benefits of periodic vulnerability scans and awareness of CVEs. FREE ACCESS
-
6m 12sIn this video, find out how to use the free Nessus tool to conduct a vulnerability scan. FREE ACCESS
-
2m 32sIn this video, you will learn how to compare baseline and current network scans to identify changes. FREE ACCESS
-
3m 31sUpon completion of this video, you will be able to describe the pen test procedure from reconnaissance to exploitation of vulnerabilities. FREE ACCESS
-
3m 38sDuring this video, you will learn how to create network traffic using hping3 in Kali Linux. FREE ACCESS
-
3m 40sIn this video, find out how to use OWASP ZAP to scan a web site for vulnerabilities. FREE ACCESS
-
5m 26sLearn how to analyze IPsec network traffic. FREE ACCESS
-
5m 2sDuring this video, you will learn how to configure a cloud-based jump box to allow access to internal hosts. FREE ACCESS
-
3m 41sAfter completing this video, you will be able to recognize where honeypots can be used to monitor malicious traffic. FREE ACCESS
-
3m 6sIn this video, learn how to consider potential risks to your business processes related to heating, ventilation, and air conditioning. FREE ACCESS
-
5m 9sAfter completing this video, you will be able to describe methods of securing assets using physical controls. FREE ACCESS
-
5m 26sUpon completion of this video, you will be able to describe how drones can present risks such as eavesdropping. FREE ACCESS
-
2m 38sIn this video, learn how to identify different types of fire suppression systems. FREE ACCESS
-
3m 40sFind out how to differentiate between vulnerability and penetration testing, describe the purpose of a jump box, list physical security examples, and perform a non-credentialed vulnerability scan. FREE ACCESS
EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE
Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.
Digital badges are yours to keep, forever.