CompTIA Security+: Organizational Security Assessment Tools & Mitigation Controls
CompTIA
| Intermediate
- 12 videos | 43m 36s
- Includes Assessment
- Earns a Badge
To prepare for the CompTIA Security+ SY0-601 certification exam, you will need to identify and describe popular organizational security assessment tools and risk mitigation controls. You will likely come across these tools at some point in your career, so prior knowledge of how these work and what they're used for will be highly beneficial. In this CompTIA Security+ SY0-601 course, you'll explore the concept of network reconnaissance and discovery, and examine packet capture and replay, file manipulation, and forensic tools. You'll also identify shell and script environments, exploitation kits, and password crackers. You'll move on to recognize methods for reconfiguring endpoint security solutions and describe configuration changes for mitigation, the concepts of isolation, containment, and segmentation, and secure orchestration, automation, and response (SOAR) solutions. This course can be used in preparation for the CompTIA Security+ SY0-601 certification exam.
WHAT YOU WILL LEARN
-
Discover the key concepts covered in this courseDescribe the following network reconnaissance and discovery tools: tracert/traceroute, nslookup/dig, ipconfig/ifconfig, nmap, ping/pathping, hping, netstat, netcat, arp, route, curl, theharvester, sn1per, dnsenum, nessus, and cuckooCompare the following packet capture and replay tools: tcpreplay, tcpdump, and wiresharkSurvey file manipulation tools, as in head, tail, cat, grep, chmod, and loggerDescribe shell and script environments like ssh, powershell, python, and opensslCompare various forensic tools like dd, memdump, winhex, ftk imager, and autopsy
-
Describe exploitation frameworks, exploitation kits, and various password crackers like john the ripper and cainDescribe methods for reconfiguring endpoint security solutions, like application whitelisting, blacklisting, and quarantineDefine configuration changes for mitigation, like firewall rules, mdm, dlp, content and url filtering, and updating or revoking certificatesDescribe the mitigation concepts of isolation, containment, and segmentation with popular use casesDefine the concept of secure orchestration, automation, and response (soar) and its associated runbooks and playbooksSummarize the key concepts covered in this course
IN THIS COURSE
-
1m 38s
-
12m 19sAfter completing this video, you will be able to describe the following network reconnaissance and discovery tools: tracert/traceroute, nslookup/dig, ipconfig/ifconfig, Nmap, ping/pathping, hping, netstat, netcat, arp, route, curl, theHarvester, sn1per, DNSenum, Nessus, and Cuckoo. FREE ACCESS
-
2m 30sIn this video, you will learn how to compare the following packet capture and replay tools: Tcpreplay, Tcpdump, and Wireshark. FREE ACCESS
-
2m 23sIn this video, learn how to survey file manipulation tools, such as head, tail, cat, grep, chmod, and logger. FREE ACCESS
-
3m 21sAfter completing this video, you will be able to describe shell and script environments such as SSH, PowerShell, Python, and OpenSSL. FREE ACCESS
-
4m 8sFind out how to compare various forensic tools, like dd, Memdump, WinHex, FTK Imager, and Autopsy. FREE ACCESS
-
4m 14sUpon completion of this video, you will be able to describe exploitation frameworks, exploitation kits, and various password crackers like John the Ripper and Cain. FREE ACCESS
-
3m 4sUpon completion of this video, you will be able to describe methods for reconfiguring endpoint security solutions, like application whitelisting, blacklisting, and quarantine. FREE ACCESS
-
2m 43sLearn how to define configuration changes for mitigation, such as firewall rules, MDM, DLP, content and URL filtering, and updating or revoking certificates. FREE ACCESS
-
3m 37sUpon completion of this video, you will be able to describe the mitigation concepts of isolation, containment, and segmentation, with popular use cases. FREE ACCESS
-
2m 56sFind out how to define the concept of secure orchestration, automation, and response (SOAR) and its associated runbooks and playbooks. FREE ACCESS
-
45s
EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE
Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.
Digital badges are yours to keep, forever.