Conducting Security Assessments
CASP+ 2018
| Expert
- 12 videos | 45m 9s
- Includes Assessment
- Earns a Badge
Discover enterprise security operations and explore numerous methods for conducting effective security assessments. In this course, you will review security assessment methods, reconnaissance, fingerprinting, social engineering, and open-source intelligence. Next, you will examine routing tables, DNS records, search engines, and security assessment types. You will then consider penetration testing and assessments and look at exercises and audits. Finally, you will be introduced to scanners, additional security assessment tools, and several types of host tools.
WHAT YOU WILL LEARN
-
Describe security assessment methodsDescribe reconnaissance, fingerprinting, and social engineeringDescribe open-source intelligenceDescribe routing tables, dns records, and search enginesDescribe security assessment typesDescribe penetration testing and assessments
-
Define exercises and auditsDescribe scannersDefine additional security assessment toolsDescribe types of host toolsSpecify physical security toolsDescribe how to conduct security assessments
IN THIS COURSE
-
3m 20sAfter completing this video, you will be able to describe security assessment methods. FREE ACCESS
-
4m 48sUpon completion of this video, you will be able to describe reconnaissance, fingerprinting, and social engineering. FREE ACCESS
-
2m 4sUpon completion of this video, you will be able to describe open-source intelligence. FREE ACCESS
-
2m 21sAfter completing this video, you will be able to describe routing tables, DNS records, and search engines. FREE ACCESS
-
3m 37sUpon completion of this video, you will be able to describe different types of security assessments. FREE ACCESS
-
2m 54sUpon completion of this video, you will be able to describe penetration testing and assessments. FREE ACCESS
-
4m 37sIn this video, you will learn how to define exercises and audits. FREE ACCESS
-
6m 6sUpon completion of this video, you will be able to describe scanners. FREE ACCESS
-
4m 49sIn this video, you will learn how to define additional security assessment tools. FREE ACCESS
-
4m 5sUpon completion of this video, you will be able to describe types of host tools. FREE ACCESS
-
4m 20sUpon completion of this video, you will be able to specify physical security tools. FREE ACCESS
-
2m 9sUpon completion of this video, you will be able to describe how to conduct security assessments. FREE ACCESS
EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE
Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.
Digital badges are yours to keep, forever.