Final Exam: Security Analyst
Intermediate
- 1 video | 32s
- Includes Assessment
- Earns a Badge
Final Exam: Security Analyst will test your knowledge and application of the topics presented throughout the Security Analyst track of the Skillsoft Aspire Security Analyst to Security Architect Journey.
WHAT YOU WILL LEARN
-
Define continuous security monitoring and list its benefitscompare vms and containerslist the threats, vulnerabilities, and mitigation techniques in a network securitycompare the types of risk responses that an organization may adaptidentify the various types of security protocolsdescribe subnetting and its advantagescompare pen testing and vulnerability assessmentsclassify the various types of security protocolsrecognize how http session management can affect securityidentify the key point for creating an effective checklist for nac securityconfigure a vpn to protect data in motiondistinguish between governance and managementcompare vms and containers characteristicsuse group policy to implement user account hardeningdistinguish between pen testing and vulnerability assessmentsclassify the various types of honeypots that can be usedidentify the security risks introduced by byod and iot along with their preventive measureslist the nac authentication methodsidentify the phases of the secure devops lifecycledescribe types of security topologiesidentify the security risks introduced by byod and iotrecognize the deployment strategies of a honeypotdefine the secure devops lifecycledescribe the various types of dns attacks and their mitigationsdescribe honeypot usesidentify the various types of tools used in pen testingidentify the types of weak protocols and their replacementsconfigure a vpn to protect dataspecify how honeypots are placed in a networkdescribe the target selection for pen testing
-
identify the threat actorsidentify the risks introduced by byod and iot along with their preventive measuresdiscuss network demilitarized zones and how they help protect corporate informationuse group policy to enable file system auditingcompare the various types of honeypots that can be usedconfigure file encryption to protect data at restdefine an advanced persistent threat and its purposedescribe how employee training, awareness, and advocacy should be implemented and how it plays a crucial role in the protection of an organization's informationdescribes the benefits of continuous securityscan hosts for security weaknesses from linuxidentify the various roles and responsibilities of senior management in governancelist the steps of the apt lifecycledescribe the characteristics of apts as well as their goals and objectivesdiscover the key concepts covered in this coursedescribe the process of rolling out a security governance programdescribe the elements used in designing goals of a security topologylist best practices related to it security auditingdiscuss the problems presented by organizational and personal e-mail, and best practices for working with e-mail, including how to protect yourself from spamdescribe the role physical security plays in the protection of corporate dataview a packet capture to identify suspicious activitydescribe the motives behind an apt and the probable targetsdescribe best practices for working with and handling corporate information while travelingdescribe the importance of securing mobile devicesspecify the proper ways to handle sensitive company information, including the differences between working with online data and physical mediaspecify how social engineering is conducted and how it can be mitigated through corporate policyspecify the top kinds of security threats facing organizations todayspecify the importance of implementing organizational security programs and why companies that don't have them put themselves at riskspecify what network hardening is and how it relates to the protection of corporate informationcompare governance and managementdefine the risk assessment processes that can help you protect your assets
EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE
Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.
Digital badges are yours to keep, forever.