Final Exam: Security Architect
Intermediate
- 1 video | 32s
- Includes Assessment
- Earns a Badge
Final Exam: Security Architect will test your knowledge and application of the topics presented throughout the Security Architect track of the Skillsoft Aspire Security Analyst to Security Architect Journey.
WHAT YOU WILL LEARN
-
Recognize how to determine the appropriate scope of engagementidentify the best practice for creating a data privacy breach plan and notifying stakeholdersexecute a simple ansible playbookidentify common types of security data breaches and how the notification process is different for each typeidentify security solutions that align with business objectivesrecognize how to respond to and manage incidentsidentify security solutionsdescribe pii and phidescribe of the benefits of having a easy reference checklist or templates prepared when defining roedescribe best practices you should outline in the event that testing is successful or unsuccessfuldescribe the transition to playbooks and services in the cloudlist key logistical considerations such as testing tools, personnel, and test schedulesdescribe how to ensure proper authority has been granted to commence any testing, such as obtaining signatures from key stakeholdersdiscuss the gramm leach bliley act breach guidelines and stakeholder response obligationsdescribe common risks and limitations you should outline such as impact on systems, and ensuring backups are available and the disaster recovery plan is intactdescribe the use of automation to improve consistency for security practicesprovide an overview of the importance of ethical hacking in today's worldrecognize the importance of using templates or checklists prior to and during a penetration testcompare ethical hacking tools such as nmap, wireshark, metasploit, and kali linuxdescribe elements that should be included in a final report such as actions taken, problems, and findingsdescribe the tools used in security triagelist common ethical hacking tools such as nmap, wireshark, metasploit, and kali linuxdescribe common tips and rules of thumb for security triageplan security with devops in mindrecognize best practices when testing uncovers exploits or vulnerabilitiesprovide an overview of the benefits of having a easy reference checklist or templates prepared when defining roelist different types of ethical hacking such as web application, system hacking, web server, wireless, and social engineeringanalyze system log activity and describe security events to look fordescribe the importance of communication and stakeholder management in security triagerecall how gdpr protects european union citizen data
-
describe the concepts of security triage and strategies to implement triagedescribe some of the challenges in implementing security playbooksdiscuss the digital privacy act and breach response obligations and focus areas for the compliance plandescribe various approaches to security through playbooksdescribe warranty, limitation of liability, and indemnification considerations to include when outlining the intent of testing activities, as well as and any liability concernsidentify the relevance of security baselines, compliance reports, and regulatory compliancerecall pci security requirementsdescribe common protocol anomalies that require triagedescribe how proactive ethical hacking can build better overall security through vulnerability assessmentsrecall how glba applies to financial institutionslist different types of real-world hackers such as white hat, black hat, and grey hatplan security can be implemented with devopsdescribe the important elements needed in a security playbookanalyze dns activity and describe security events to look fordescribe automation techniques in security triagerecognize iso security standardsidentify the sections of the data breach response plan and why it is important to have onediscuss the hipaa breach guidelines and stakeholder response obligationsconfigure an ips to protect a system with an ansible playbookinstall ansible and remotely execute commands on a managed hostdescribe how siem allows for centralized security event monitoringdiscuss the general data protection regulation breach guidelines and stakeholder response obligationsrecognize the need for proactive security incident planningconfigure unattended upgrades with an ansible playbook to keep a system up to dateidentify stakeholders that need to be notified during a security breach incident and best practices for notifying themrecognize nist security standardsdescribe approaches to detecting anomalies and handling them with security triagecompare the relevance of security baselines, compliance reports, and regulatory compliancerecognize how hipaa protects medical informationplan how security can be implemented with devops
EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE
Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.
Digital badges are yours to keep, forever.