CISA 2022: System Development & Vulnerability Testing
CISA
| Expert
- 13 videos | 1h 12m 56s
- Includes Assessment
- Earns a Badge
Systems development and vulnerability testing often go hand in hand to ensure the timely delivery of system changes or entire new solutions. In this course, you'll learn about system development and vulnerability testing, beginning with secure coding, security testing types, vulnerability scanning, and how to perform a vulnerability scan. Then you'll explore comparing network scans, penetration testing, packet forgery, and web application vulnerability scans. Finally, you'll dig into IPsec network traffic, jump boxes, and honeypots. This course helps prepare learners for the ISACA certification exam, Certified Information Systems Auditor (CISA).
WHAT YOU WILL LEARN
-
Discover the key concepts covered in this courseOutline common secure coding practicesDistinguish between white, gray, and black-box testingOutline the benefits of periodic vulnerability scans and awareness of common vulnerabilities and exposures (cves)Utilize the free nessus tool to perform a vulnerability scanCompare and contrast baseline and current network scans to identify changesOutline the pen test procedure from reconnaissance to exploiting vulnerabilities
-
Falsify network traffic using hping3 in kali linuxUse owasp zap to scan a web site for vulnerabilitiesAnalyze ipsec network trafficConfigure a cloud-based jump box to allow access to internal hostsOutline how honeypots can be used to monitor malicious trafficSummarize the key concepts covered in this course
IN THIS COURSE
-
1m 7sIn this video, we will discover the key concepts covered in this course. FREE ACCESS
-
5m 11sAfter completing this video, you will be able to outline common secure coding practices. FREE ACCESS
-
5m 36sUpon completion of this video, you will be able to distinguish between white, gray, and black-box testing. FREE ACCESS
-
5m 48sAfter completing this video, you will be able to outline the benefits of periodic vulnerability scans and awareness of Common Vulnerabilities and Exposures (CVEs). FREE ACCESS
-
6m 22sIn this video, find out how to utilize the free Nessus tool to perform a vulnerability scan. FREE ACCESS
-
4m 58sIn this video, we will compare and contrast baseline and current network scans to identify changes. FREE ACCESS
-
5m 3sUpon completion of this video, you will be able to outline the pen test procedure from reconnaissance to exploiting vulnerabilities. FREE ACCESS
-
9m 48sIn this video, you will learn how to falsify network traffic using hping3 in Kali Linux. FREE ACCESS
-
6m 31sDiscover how to use OWASP ZAP to scan a web site for vulnerabilities. FREE ACCESS
-
7m 53sFind out how to analyze IPsec network traffic. FREE ACCESS
-
8m 44sIn this video, learn how to configure a cloud-based jump box to allow access to internal hosts. FREE ACCESS
-
4m 53sAfter completing this video, you will be able to outline how honeypots can be used to monitor malicious traffic. FREE ACCESS
-
1m 1sIn this video, we will summarize the key concepts covered in this course. FREE ACCESS
EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE
Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.
Digital badges are yours to keep, forever.