CRISC 2023: Security Testing
CRISC
| Intermediate
- 12 videos | 1h 10m 16s
- Includes Assessment
- Earns a Badge
Vulnerability scanning identifies host and network vulnerabilities and must be an ongoing task. Penetration testing is an active security method by which there is an attempt to exploit discovered vulnerabilities. In this course, you will begin by discovering how to plan for, schedule, and execute vulnerability assessments, identify common vulnerability scanning tools, and conduct an Nmap scan. Next, you will use Zenmap to execute a security scan and test web app security using the Open Worldwide Application Security Project (OWASP) Zed Attack Proxy (ZAP) tool. Then you will explore penetration testing and the Metasploit framework and use the Burp Suite tool as an HTTP intermediary proxy. Finally, you will view security alerts using Microsoft Defender for Cloud. This course can be used to prepare for the ISACA(r) Certified in Risk and Information Systems Control (CRISC(r)) certification.
WHAT YOU WILL LEARN
-
Discover the key concepts covered in this coursePlan, schedule, and run vulnerability assessments to identify weaknessesIdentify commonly used vulnerability scanning toolsUse nmap to conduct a port scanUse nessus to execute a vulnerability scanUse zenmap to execute a scan
-
Use the open worldwide application security project (owasp) zed attack proxy (zap) tool to test web application securityDescribe how penetration testing provides value to the security programNavigate through the metasploit framework consoleUse the burp suite tool as an http intermediate proxyView security alerts and recommendations for cloud resourcesSummarize the key concepts covered in this course
IN THIS COURSE
-
1m 13sIn this video, we will discover the key concepts covered in this course. FREE ACCESS
-
7m 12sAfter completing this video, you will be able to plan, schedule, and run vulnerability assessments to identify weaknesses. FREE ACCESS
-
8m 6sUpon completion of this video, you will be able to identify commonly used vulnerability scanning tools. FREE ACCESS
-
6m 23sIn this video, find out how to use Nmap to conduct a port scan. FREE ACCESS
-
9m 24sLearn how to use Nessus to execute a vulnerability scan. FREE ACCESS
-
6m 3sDuring this video, discover how to use Zenmap to execute a scan. FREE ACCESS
-
5m 28sFind out how to use the Open Worldwide Application Security Project (OWASP) Zed Attack Proxy (ZAP) tool to test web application security. FREE ACCESS
-
7m 42sAfter completing this video, you will be able to describe how penetration testing provides value to the security program. FREE ACCESS
-
5m 13sLearn how to navigate through the Metasploit framework console. FREE ACCESS
-
6m 25sIn this video, discover how to use the Burp Suite tool as an HTTP intermediate proxy. FREE ACCESS
-
6m 9sDuring this video, you will learn how to view security alerts and recommendations for cloud resources. FREE ACCESS
-
58sIn this video, we will summarize the key concepts covered in this course. FREE ACCESS
EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE
Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.
Digital badges are yours to keep, forever.