Final Exam: Ethical Hacker
Intermediate
- 1 video | 32s
- Includes Assessment
- Earns a Badge
Final Exam: Ethical Hacker will test your knowledge and application of the topics presented throughout the Ethical Hacker track of the Skillsoft Aspire Penetration Tester to SecOps Engineer Journey.
WHAT YOU WILL LEARN
-
Identify and implement specific responses to riskdescribe and use dread, pasta, and other risk modelsrecognize account creation conceptsdescribe incident response conceptsexecute basic metasploit commandsconduct recovery and remediation activitiesdescribe pci-dss standards and integrate them into ethical hackinginterpret and apply nist 800-12create a response plan for physical incidentsconfigure the firewall in windows 10 and windows server 2019apply the ptes to ethical hacking to plan, execute, and report on your ethical hacking projectdescribe security devices and how they relate to ethical hackingrecognize types of malwareproperly classify and describe different types of incidentsdescribe malware threatsapply the nsa-iam to ethical hacking to plan, execute, and report on your ethical hacking projectconfigure windows defendercreate a response plan for cyber incidentsuse owasp zap to scan a target web sitedescribe the shodan search engine, its purpose and usage, and the role it plays in ethical hacking and penetration testinguse vega to scan a target web sitedesign access control and account management processesuse multiple informational web sites to gain information about a targetdescribe nmap and how it can be useddescribe abac and its advantages over standard access controluse shodan to gather information about vulnerabilitiesrecognize sql injection and variationsrecognize nmap and how it can be useduse nmap to scan a target system or networkuse web sites to gain information about a target
-
describe sql injection and variationsemploy nist 800-26 standards to manage it securitydescribe and implement mac, dac, and rbacassess security vulnerabilities using cvssdescribe types of malwaredescribe antivirus concepts and implement an av strategyrecall the basics of metasploitexecute basic sql injectionevaluate security in accordance with iso/iec 18045describe the usage of siem and deploy siem systemsutilize ids/ips and describe its relation to ethical hackingdescribe ids/ips and describe its relation to ethical hackingdescribe and apply basic incident response forensics including evidence handling and basic techniquesimplement basic snort idsapply risk management standards according to nist 800-37describe secure software conceptsuse common windows hacking techniquesproperly apply filtering and data validationapply basic incident response forensics including imaging a drive and basic legal standardsutilize the cia triangle and the mccumber cube to assess risks and threatscorrectly deploy firewall solutions and describe their relevance to ethical hackingcalculate risk levels in a quantitative mannerdescribe cross-site scriptingdescribe how steganography worksdescribe and implement iso 27001conduct an after-action review of incident responserecognize types of dos and associated countermeasuresdescribe the cobit 5 standarddescribe nist 800-14 security protocolsuse common steganography tools
EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE
Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.
Digital badges are yours to keep, forever.