CISA 2022: System Development & Vulnerability Testing

CISA    |    Expert
  • 13 videos | 1h 12m 56s
  • Includes Assessment
  • Earns a Badge
Rating 5.0 of 1 users Rating 5.0 of 1 users (1)
Systems development and vulnerability testing often go hand in hand to ensure the timely delivery of system changes or entire new solutions. In this course, you'll learn about system development and vulnerability testing, beginning with secure coding, security testing types, vulnerability scanning, and how to perform a vulnerability scan. Then you'll explore comparing network scans, penetration testing, packet forgery, and web application vulnerability scans. Finally, you'll dig into IPsec network traffic, jump boxes, and honeypots. This course helps prepare learners for the ISACA certification exam, Certified Information Systems Auditor (CISA).

WHAT YOU WILL LEARN

  • Discover the key concepts covered in this course
    Outline common secure coding practices
    Distinguish between white, gray, and black-box testing
    Outline the benefits of periodic vulnerability scans and awareness of common vulnerabilities and exposures (cves)
    Utilize the free nessus tool to perform a vulnerability scan
    Compare and contrast baseline and current network scans to identify changes
    Outline the pen test procedure from reconnaissance to exploiting vulnerabilities
  • Falsify network traffic using hping3 in kali linux
    Use owasp zap to scan a web site for vulnerabilities
    Analyze ipsec network traffic
    Configure a cloud-based jump box to allow access to internal hosts
    Outline how honeypots can be used to monitor malicious traffic
    Summarize the key concepts covered in this course

IN THIS COURSE

  • 1m 7s
    In this video, we will discover the key concepts covered in this course. FREE ACCESS
  • 5m 11s
    After completing this video, you will be able to outline common secure coding practices. FREE ACCESS
  • Locked
    3.  Security Testing Types
    5m 36s
    Upon completion of this video, you will be able to distinguish between white, gray, and black-box testing. FREE ACCESS
  • Locked
    4.  Vulnerability Scanning
    5m 48s
    After completing this video, you will be able to outline the benefits of periodic vulnerability scans and awareness of Common Vulnerabilities and Exposures (CVEs). FREE ACCESS
  • Locked
    5.  Performing a Vulnerability Scan
    6m 22s
    In this video, find out how to utilize the free Nessus tool to perform a vulnerability scan. FREE ACCESS
  • Locked
    6.  Comparing Network Scans
    4m 58s
    In this video, we will compare and contrast baseline and current network scans to identify changes. FREE ACCESS
  • Locked
    7.  Penetration Testing
    5m 3s
    Upon completion of this video, you will be able to outline the pen test procedure from reconnaissance to exploiting vulnerabilities. FREE ACCESS
  • Locked
    8.  Executing Packet Forgery
    9m 48s
    In this video, you will learn how to falsify network traffic using hping3 in Kali Linux. FREE ACCESS
  • Locked
    9.  Scanning for Web Application Vulnerabilities
    6m 31s
    Discover how to use OWASP ZAP to scan a web site for vulnerabilities. FREE ACCESS
  • Locked
    10.  Analyzing IPsec Network Traffic
    7m 53s
    Find out how to analyze IPsec network traffic. FREE ACCESS
  • Locked
    11.  Configuring Jump Boxes
    8m 44s
    In this video, learn how to configure a cloud-based jump box to allow access to internal hosts. FREE ACCESS
  • Locked
    12.  Honeypots
    4m 53s
    After completing this video, you will be able to outline how honeypots can be used to monitor malicious traffic. FREE ACCESS
  • Locked
    13.  Course Summary
    1m 1s
    In this video, we will summarize the key concepts covered in this course. FREE ACCESS

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE

Rating 5.0 of 1 users Rating 5.0 of 1 users (1)
Rating 4.8 of 44 users Rating 4.8 of 44 users (44)
Rating 5.0 of 1 users Rating 5.0 of 1 users (1)