Conducting Security Assessments

CASP+ 2018    |    Expert
  • 12 videos | 45m 9s
  • Includes Assessment
  • Earns a Badge
Rating 4.6 of 12 users Rating 4.6 of 12 users (12)
Discover enterprise security operations and explore numerous methods for conducting effective security assessments. In this course, you will review security assessment methods, reconnaissance, fingerprinting, social engineering, and open-source intelligence. Next, you will examine routing tables, DNS records, search engines, and security assessment types. You will then consider penetration testing and assessments and look at exercises and audits. Finally, you will be introduced to scanners, additional security assessment tools, and several types of host tools.

WHAT YOU WILL LEARN

  • Describe security assessment methods
    Describe reconnaissance, fingerprinting, and social engineering
    Describe open-source intelligence
    Describe routing tables, dns records, and search engines
    Describe security assessment types
    Describe penetration testing and assessments
  • Define exercises and audits
    Describe scanners
    Define additional security assessment tools
    Describe types of host tools
    Specify physical security tools
    Describe how to conduct security assessments

IN THIS COURSE

  • 3m 20s
    After completing this video, you will be able to describe security assessment methods. FREE ACCESS
  • 4m 48s
    Upon completion of this video, you will be able to describe reconnaissance, fingerprinting, and social engineering. FREE ACCESS
  • Locked
    3.  Open-source Intelligence (OSINT)
    2m 4s
    Upon completion of this video, you will be able to describe open-source intelligence. FREE ACCESS
  • Locked
    4.  Routing Tables, DNS Records, and Search Engines
    2m 21s
    After completing this video, you will be able to describe routing tables, DNS records, and search engines. FREE ACCESS
  • Locked
    5.  Security Assessment Types
    3m 37s
    Upon completion of this video, you will be able to describe different types of security assessments. FREE ACCESS
  • Locked
    6.  Penetration Testing and Assessment
    2m 54s
    Upon completion of this video, you will be able to describe penetration testing and assessments. FREE ACCESS
  • Locked
    7.  Exercises and Audits
    4m 37s
    In this video, you will learn how to define exercises and audits. FREE ACCESS
  • Locked
    8.  Scanners
    6m 6s
    Upon completion of this video, you will be able to describe scanners. FREE ACCESS
  • Locked
    9.  Additional Security Assessment Tools
    4m 49s
    In this video, you will learn how to define additional security assessment tools. FREE ACCESS
  • Locked
    10.  Types of Host Tools
    4m 5s
    Upon completion of this video, you will be able to describe types of host tools. FREE ACCESS
  • Locked
    11.  Physical Security Tools
    4m 20s
    Upon completion of this video, you will be able to specify physical security tools. FREE ACCESS
  • Locked
    12.  Exercise: Conduct a Security Assessment
    2m 9s
    Upon completion of this video, you will be able to describe how to conduct security assessments. FREE ACCESS

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE

Rating 5.0 of 1 users Rating 5.0 of 1 users (1)
Rating 4.6 of 30 users Rating 4.6 of 30 users (30)
Rating 4.5 of 19 users Rating 4.5 of 19 users (19)

PEOPLE WHO VIEWED THIS ALSO VIEWED THESE

Rating 4.5 of 87 users Rating 4.5 of 87 users (87)
Rating 4.6 of 94 users Rating 4.6 of 94 users (94)