CompTIA Security+: Audits, Assessments, & Awareness

CompTIA Security+    |    Beginner
  • 8 videos | 23m 55s
  • Includes Assessment
  • Earns a Badge
Rating 5.0 of 2 users Rating 5.0 of 2 users (2)
A security audit is a systematic and methodical examination of an organization's security infrastructure, policies, and procedures. The goal is to identify vulnerabilities, weaknesses, and potential threats to sensitive information assets, physical assets, and personnel. In this final course, the learner will be exposed to topics such as internal and external audit and attestation, penetration testing audits, user guidance and training, phishing campaigns, and security training monitoring and reporting. This course is part of a series that prepares you for the CompTIA Security+ (SY0-701) exam.

WHAT YOU WILL LEARN

  • Discover the key concepts covered in this course
    Provide an overview of internal audit and attestation, including compliance, audit committee, and self-assessments
    Define external audit and attestation with regulatory, examinations, assessment, and independent third-party audits
    Provide an overview of penetration testing, including known environment, partially known environment, unknown environment, physical, offensive, defensive, integrated, passive, and active reconnaissance
  • Provide an overview of user guidance and training involving policy/handbooks, situational awareness, insider threats, password management, removable media and cables, social engineering, operational security, anomalous behavior recognition, and hybrid/remote work environments best practices
    Identify how to recognize a phishing attempt and respond to reported suspicious messages
    Explain security training monitoring and reporting techniques
    Summarize the key concepts covered in this course

IN THIS COURSE

  • 36s
    In this video, we will discover the key concepts covered in this course. FREE ACCESS
  • 3m 21s
    After completing this video, you will be able to provide an overview of internal audit and attestation, including compliance, audit committee, and self-assessments. FREE ACCESS
  • Locked
    3.  External Audit and Attestation
    4m 52s
    Upon completion of this video, you will be able to define external audit and attestation with regulatory, examinations, assessment, and independent third-party audits. FREE ACCESS
  • Locked
    4.  Penetration Testing
    6m 59s
    After completing this video, you will be able to provide an overview of penetration testing, including known environment, partially known environment, unknown environment, physical, offensive, defensive, integrated, passive, and active reconnaissance. FREE ACCESS
  • Locked
    5.  User Guidance and Training
    2m 8s
    Upon completion of this video, you will be able to provide an overview of user guidance and training involving policy/handbooks, situational awareness, insider threats, password management, removable media and cables, social engineering, operational security, anomalous behavior recognition, and hybrid/remote work environments best practices. FREE ACCESS
  • Locked
    6.  Phishing Campaigns
    3m 20s
    After completing this video, you will be able to identify how to recognize a phishing attempt and respond to reported suspicious messages. FREE ACCESS
  • Locked
    7.  Security Training Monitoring and Reporting
    2m 10s
    Upon completion of this video, you will be able to explain security training monitoring and reporting techniques. FREE ACCESS
  • Locked
    8.  Course Summary
    28s
    In this video, we will summarize the key concepts covered in this course. FREE ACCESS

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE

Rating 4.7 of 266 users Rating 4.7 of 266 users (266)
Rating 5.0 of 3 users Rating 5.0 of 3 users (3)
Rating 5.0 of 2 users Rating 5.0 of 2 users (2)