CompTIA Cybersecurity Analyst+: Vulnerability & Penetration Testing
Cybersecurity
| Intermediate
- 14 videos | 1h 21m 28s
- Includes Assessment
- Earns a Badge
Vulnerability scanning identifies host and network vulnerabilities and must be an ongoing task. Penetration testing is an active security method by which there is an attempt to exploit discovered vulnerabilities. In this course, you will discover how to plan for, schedule, and execute vulnerability assessments, identify common vulnerability scanning tools, and conduct an nmap scan. Next, you will use Nessus and Zenmap to execute security scans and text web app security using the OWASP Zed Attack Proxy (ZAP) tool. Then you will explore penetration testing and the Metasploit framework and use the Burp Suite tool as an HTTP intermediary proxy. Finally, you will learn how to manage Azure policy, investigate potential indicators of compromise, and examine how IT security relates to industrial control systems. This course can be used to prepare for the CS0-003: CompTIA Cybersecurity Analyst+ exam.
WHAT YOU WILL LEARN
-
Discover the key concepts covered in this coursePlan, schedule, and run vulnerability assessments to identify weaknessesIdentify commonly used vulnerability scanning toolsUse nmap to conduct a port scanUse nessus to execute a vulnerability scanUse zenmap to execute a scanUse the owasp zed attack proxy (zap) tool to test web application security
-
Describe how penetration testing provides value to the security programNavigate through the metasploit framework consoleUse the burp suite tool as an http intermediate proxyUse azure policy to view cloud resource complianceDescribe the importance of detecting anomalies and potential indicators of compromiseRecognize how it security applies to supervisory control and data acquisition (scada), industrial control systems (icss), and operational technology (ot)Summarize the key concepts covered in this course
IN THIS COURSE
-
1m 19sIn this video, we will discover the key concepts covered in this course. FREE ACCESS
-
9m 51sDuring this video, you will learn how to plan, schedule, and run vulnerability assessments to identify weaknesses. FREE ACCESS
-
4m 51sFind out how to identify commonly used vulnerability scanning tools. FREE ACCESS
-
8m 3sIn this video, discover how to use nmap to conduct a port scan. FREE ACCESS
-
5m 29sLearn how to use Nessus to execute a vulnerability scan. FREE ACCESS
-
5m 17sIn this video, find out how to use Zenmap to execute a scan. FREE ACCESS
-
6m 22sDuring this video, discover how to use the OWASP Zed Attack Proxy (ZAP) tool to test web application security. FREE ACCESS
-
7m 20sAfter completing this video, you will be able to describe how penetration testing provides value to the security program. FREE ACCESS
-
6m 43sFind out how to navigate through the Metasploit framework console. FREE ACCESS
-
6m 1sDiscover how to use the Burp Suite tool as an HTTP intermediate proxy. FREE ACCESS
-
6m 1sIn this video, you will learn how to use Azure Policy to view cloud resource compliance. FREE ACCESS
-
6m 52sUpon completion of this video, you will be able to describe the importance of detecting anomalies and potential indicators of compromise. FREE ACCESS
-
6m 23sAfter completing this video, you will be able to recognize how IT security applies to Supervisory Control and Data Acquisition (SCADA), industrial control systems (ICSs), and operational technology (OT). FREE ACCESS
-
1mIn this video, we will summarize the key concepts covered in this course. FREE ACCESS
EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE
Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.
Digital badges are yours to keep, forever.