CompTIA Security+: Security Assessment & Penetration Testing Techniques
CompTIA
| Intermediate
- 12 videos | 36m 48s
- Includes Assessment
- Earns a Badge
It is important for security professionals to be aware of various security assessment and penetration testing techniques and methods. In this course, explore key assessment techniques like intelligence fusion, threat hunting, threat feeds, advisories and bulletins, vulnerability scans, and false positives/false negatives. You will also examine the fundamentals of penetration testing including black/blue/gray box methodologies, lateral movement , privilege escalation, persistence, and pivoting. Other topics include passive and active reconnaissance as well as the different exercise teams. This course can be used in preparation for the CompTIA Security+ SY0-601 certification exam.
WHAT YOU WILL LEARN
-
Discover the key concepts covered in this courseDescribe threat hunting concepts such as intelligence fusion, threat feeds, advisories, bulletins, and maneuversSurvey vulnerability scanning terms like false positives, false negatives, and credentialed vs. non-credentialedDefine additional vulnerability scanning tools and techniques like common vulnerabilities and exposures (cve), common vulnerability scoring system (cvss), and configuration reviewCompare syslog and siem system techniques such as review reports, packet captures, data inputs, user behavior analysis (uba) and sentiment analysisDescribe the characteristics of security orchestration, automation, response (soar) systems
-
Describe pen testing terms such as white box, black box, and gray boxSurvey fundamental methods for pen testing like lateral movement, privilege escalation, persistence, and pivotingDescribe passive reconnaissance as it relates to pen testing as in drones/unmanned aerial vehicle (uav), war flying, and war drivingDescribe active reconnaissance techniques such as footprintingCompare exercise teams as in red, blue, white, and purple teamsDiscover the key concepts covered in this course
IN THIS COURSE
-
1m 25s
-
1m 46sAfter completing this video, you will be able to describe threat hunting concepts such as intelligence fusion, threat feeds, advisories, bulletins, and maneuvers. FREE ACCESS
-
5m 4sIn this video, learn how to survey vulnerability scanning terms like false positives, false negatives, and credentialed vs. non-credentialed. FREE ACCESS
-
4m 21sIn this video, find out how to define additional vulnerability scanning tools and techniques like common vulnerabilities and exposures (CVE), common vulnerability scoring system (CVSS), and configuration review. FREE ACCESS
-
5m 13sIn this video, find out how to compare syslog and SIEM system techniques, such as review reports, packet captures, data inputs, user behavior analysis (UBA), and sentiment analysis. FREE ACCESS
-
3m 12sAfter completing this video, you will be able to describe the characteristics of security orchestration, automation, and response (SOAR) systems. FREE ACCESS
-
2m 57sAfter completing this video, you will be able to describe pen testing terms such as white hat, black hat, and gray hat. FREE ACCESS
-
5m 45sDuring this video, you will learn how to survey fundamental methods for pen testing like lateral movement, privilege escalation, persistence, and pivoting. FREE ACCESS
-
2m 14sAfter completing this video, you will be able to describe passive reconnaissance as it relates to pen testing using drones/unmanned aerial vehicles (UAVs), war flying, and war driving. FREE ACCESS
-
1m 13sUpon completion of this video, you will be able to describe active reconnaissance techniques, such as footprinting. FREE ACCESS
-
2m 54sIn this video, learn how to compare exercise teams such as red, blue, white, and purple teams. FREE ACCESS
-
43s
EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE
Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.
Digital badges are yours to keep, forever.