CRISC 2023: Security Testing

CRISC    |    Intermediate
  • 12 videos | 1h 10m 16s
  • Includes Assessment
  • Earns a Badge
Rating 5.0 of 1 users Rating 5.0 of 1 users (1)
Vulnerability scanning identifies host and network vulnerabilities and must be an ongoing task. Penetration testing is an active security method by which there is an attempt to exploit discovered vulnerabilities. In this course, you will begin by discovering how to plan for, schedule, and execute vulnerability assessments, identify common vulnerability scanning tools, and conduct an Nmap scan. Next, you will use Zenmap to execute a security scan and test web app security using the Open Worldwide Application Security Project (OWASP) Zed Attack Proxy (ZAP) tool. Then you will explore penetration testing and the Metasploit framework and use the Burp Suite tool as an HTTP intermediary proxy. Finally, you will view security alerts using Microsoft Defender for Cloud. This course can be used to prepare for the ISACA(r) Certified in Risk and Information Systems Control (CRISC(r)) certification.

WHAT YOU WILL LEARN

  • Discover the key concepts covered in this course
    Plan, schedule, and run vulnerability assessments to identify weaknesses
    Identify commonly used vulnerability scanning tools
    Use nmap to conduct a port scan
    Use nessus to execute a vulnerability scan
    Use zenmap to execute a scan
  • Use the open worldwide application security project (owasp) zed attack proxy (zap) tool to test web application security
    Describe how penetration testing provides value to the security program
    Navigate through the metasploit framework console
    Use the burp suite tool as an http intermediate proxy
    View security alerts and recommendations for cloud resources
    Summarize the key concepts covered in this course

IN THIS COURSE

  • 1m 13s
    In this video, we will discover the key concepts covered in this course. FREE ACCESS
  • 7m 12s
    After completing this video, you will be able to plan, schedule, and run vulnerability assessments to identify weaknesses. FREE ACCESS
  • Locked
    3.  Common Vulnerability Assessment Tools
    8m 6s
    Upon completion of this video, you will be able to identify commonly used vulnerability scanning tools. FREE ACCESS
  • Locked
    4.  Using Nmap to Conduct Port Scanning
    6m 23s
    In this video, find out how to use Nmap to conduct a port scan. FREE ACCESS
  • Locked
    5.  Conducting a Network Vulnerability Assessment
    9m 24s
    Learn how to use Nessus to execute a vulnerability scan. FREE ACCESS
  • Locked
    6.  Using Zenmap for Network Scanning
    6m 3s
    During this video, discover how to use Zenmap to execute a scan. FREE ACCESS
  • Locked
    7.  Testing Web Application Security
    5m 28s
    Find out how to use the Open Worldwide Application Security Project (OWASP) Zed Attack Proxy (ZAP) tool to test web application security. FREE ACCESS
  • Locked
    8.  Penetration Testing
    7m 42s
    After completing this video, you will be able to describe how penetration testing provides value to the security program. FREE ACCESS
  • Locked
    9.  Navigating the Metasploit Framework
    5m 13s
    Learn how to navigate through the Metasploit framework console. FREE ACCESS
  • Locked
    10.  Using Burp Suite for HTTP Sniffing
    6m 25s
    In this video, discover how to use the Burp Suite tool as an HTTP intermediate proxy. FREE ACCESS
  • Locked
    11.  Utilizing Microsoft Defender for Cloud Security Alerts
    6m 9s
    During this video, you will learn how to view security alerts and recommendations for cloud resources. FREE ACCESS
  • Locked
    12.  Course Summary
    58s
    In this video, we will summarize the key concepts covered in this course. FREE ACCESS

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE

Rating 5.0 of 1 users Rating 5.0 of 1 users (1)
Rating 5.0 of 3 users Rating 5.0 of 3 users (3)
Rating 5.0 of 1 users Rating 5.0 of 1 users (1)