Final Exam: Security Analyst

Intermediate
  • 1 video | 32s
  • Includes Assessment
  • Earns a Badge
Rating 4.7 of 31 users Rating 4.7 of 31 users (31)
Final Exam: Security Analyst will test your knowledge and application of the topics presented throughout the Security Analyst track of the Skillsoft Aspire Security Analyst to Security Architect Journey.

WHAT YOU WILL LEARN

  • Define continuous security monitoring and list its benefits
    compare vms and containers
    list the threats, vulnerabilities, and mitigation techniques in a network security
    compare the types of risk responses that an organization may adapt
    identify the various types of security protocols
    describe subnetting and its advantages
    compare pen testing and vulnerability assessments
    classify the various types of security protocols
    recognize how http session management can affect security
    identify the key point for creating an effective checklist for nac security
    configure a vpn to protect data in motion
    distinguish between governance and management
    compare vms and containers characteristics
    use group policy to implement user account hardening
    distinguish between pen testing and vulnerability assessments
    classify the various types of honeypots that can be used
    identify the security risks introduced by byod and iot along with their preventive measures
    list the nac authentication methods
    identify the phases of the secure devops lifecycle
    describe types of security topologies
    identify the security risks introduced by byod and iot
    recognize the deployment strategies of a honeypot
    define the secure devops lifecycle
    describe the various types of dns attacks and their mitigations
    describe honeypot uses
    identify the various types of tools used in pen testing
    identify the types of weak protocols and their replacements
    configure a vpn to protect data
    specify how honeypots are placed in a network
    describe the target selection for pen testing
  • identify the threat actors
    identify the risks introduced by byod and iot along with their preventive measures
    discuss network demilitarized zones and how they help protect corporate information
    use group policy to enable file system auditing
    compare the various types of honeypots that can be used
    configure file encryption to protect data at rest
    define an advanced persistent threat and its purpose
    describe how employee training, awareness, and advocacy should be implemented and how it plays a crucial role in the protection of an organization's information
    describes the benefits of continuous security
    scan hosts for security weaknesses from linux
    identify the various roles and responsibilities of senior management in governance
    list the steps of the apt lifecycle
    describe the characteristics of apts as well as their goals and objectives
    discover the key concepts covered in this course
    describe the process of rolling out a security governance program
    describe the elements used in designing goals of a security topology
    list best practices related to it security auditing
    discuss the problems presented by organizational and personal e-mail, and best practices for working with e-mail, including how to protect yourself from spam
    describe the role physical security plays in the protection of corporate data
    view a packet capture to identify suspicious activity
    describe the motives behind an apt and the probable targets
    describe best practices for working with and handling corporate information while traveling
    describe the importance of securing mobile devices
    specify the proper ways to handle sensitive company information, including the differences between working with online data and physical media
    specify how social engineering is conducted and how it can be mitigated through corporate policy
    specify the top kinds of security threats facing organizations today
    specify the importance of implementing organizational security programs and why companies that don't have them put themselves at risk
    specify what network hardening is and how it relates to the protection of corporate information
    compare governance and management
    define the risk assessment processes that can help you protect your assets

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE

Rating 3.3 of 7 users Rating 3.3 of 7 users (7)
Rating 5.0 of 2 users Rating 5.0 of 2 users (2)
Rating 5.0 of 2 users Rating 5.0 of 2 users (2)

PEOPLE WHO VIEWED THIS ALSO VIEWED THESE

Rating 4.6 of 52 users Rating 4.6 of 52 users (52)
Rating 4.3 of 16 users Rating 4.3 of 16 users (16)
Rating 4.5 of 6 users Rating 4.5 of 6 users (6)