Final Exam: Penetration Tester
Intermediate
- 1 video | 32s
- Includes Assessment
- Earns a Badge
Final Exam: Penetration Tester will test your knowledge and application of the topics presented throughout the Penetration Tester track of the Skillsoft Aspire Penetration Tester to SecOps Engineer Journey.
WHAT YOU WILL LEARN
-
Compare vulnerability to penetration testing and describe the function of eachdescribe cryptography and its four goalsidentify how to translate penetration testing results into a formalized report that can be used for the end-user awareness programdescribe various complex security controls and how they are implemented, including industrial and government security controls and baselinesrecognize wireless security technologies such as wep, wpa/2/3, and the vulnerabilities they have that could be exploitedcapture and analyze network traffic using wiresharkrecognize the built-in sniffing capabilities of wi-fi used for penetration testingdescribe penetration testing tools that are used by professional hackersdifferentiate between malware types and recognize some of the consequences of using targeted malwaredescribe the steps necessary to implement a physical penetration testing program and the phases of penetration testingdescribe what should be documented during a penetration test and why it is importantdescribe the different categories of findingsdescribe active information gathering along with methods and techniques for collecting informationdescribe the cis critical security controls and how they are implementedstep through the process to perform rough ap analysisidentify the role of human error in causing data breachesdescribe the common types of penetration and the importance of testing each typedescribe defensive and quick win controls for the major control types, how they are compromised, and steps for root cause analysisinvestigate security controls when one fails and describe how to mitigate the outcomeidentify the business need to provide wi-fi access for internal employees and external partners and recognize the categories of wireless threats that can compromise networksidentify the vulnerabilities and processes used to undermine an unsecured wi-fi hotspotrecognize how to choose a password cracking techniquedescribe how to assess security controls, including establishing security metrics for risk management framework and reportingdifferentiate between symmetric and asymmetric cryptographydescribe passive information gathering and methods for collecting informationdescribe the processes used to undermine a wi-fi client's vulnerabilitiesdescribe common client-side attacks such as cross-site scripting attacks and methods to help prevent themdescribe the importance of physical penetration testing and why organizations must perform penetration testingdescribe how to protect sensitive data with security testing and the five penetration testing rules of engagementdescribe the rules of engagement and how they are used
-
differentiate between scanning and enumerationrecognize social engineering attacks, and how to they relate to penetration testingdescribe user privilege escalation and methods that can be used to protect your system from security attacksidentify penetration testing types and describe their reliance on end-user behavioroutline the steps used to perform a denial of service attack against a wireless networkdescribe how to find a vulnerability using scanners and other techniquesdescribe the purpose and results of dumpster diving and how to protect against this form of attackidentify how to recognize and prevent tailgating and recognize the risks that it exposesdescribe the importance of working with management to conduct further testing after recommendations are implementeddescribe the goals of social engineering penetration testsdescribe tips and tricks for preventing social engineering attacksdescribe security controls in relation to the overall nist cybersecurity framework and how security controls are relevant in secopsdescribe the importance of setting stopping points and when to stop a penetration testdescribe the role of end-user awareness in preventing cybersecurity attacks and during penetration testingdescribe when to use security controls and how they are enforceddescribe the cause of buffer overflow and how this exploit can be used for attacksdescribe various areas where security controls are commonly useddescribe how to perform social engineering penetration testingdescribe white box penetration testing and why it may be useddescribe common web cyber attacks and countermeasures to prevent these attacksdescribe grey box penetration testing and why it may be usedidentify different lock pick tools and why lock picking is important in cybersecuritydescribe the major security control types and the components of a security controldescribe what penetration testing is and why it is important to the organizationdescribe how to set expectations and why it is importantdescribe black box penetration testing and why it may be usedidentify web application security testing methodologies and the five stages of opsecidentify the types of penetration testing and common terminologydescribe the limitations of penetration testing and challenges for organizationslist the vulnerabilities of wep security and identify how they can be exploited
EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE
Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.
Digital badges are yours to keep, forever.