System Security Certified Practitioner (SSCP 2018): Security Assessments
Intermediate
- 15 videos | 1h 1m 31s
- Includes Assessment
- Earns a Badge
This 15-video course prepares learners for the Systems Security Certified Practitioner (SSCP) certification exam by exploring security assessments, vulnerability scans, and penetration testing. First, you will examine the Nmap (network mapper) scanner to probe computer networks for host discovery, service, and operating system detection. You will learn how to use Nmap to conduct a network scan by using Windows. This course examines vulnerability scanning, and it demonstrates how to do penetration testing to identify and exploit host and network weaknesses. Learners will examine the importance of monitoring and analysis to identify security incidents. You will learn how to use a Windows performance monitor, and how to monitor resource usage in Linux. Continue by examining LANguard and end map assessments. This course then demonstrates how to view system logs to troubleshoot problems, and how to enhance the security of a network. You will learn how to configure log filtering in a Windows environment. Finally, learners will explore SCADA (Supervisory Control and Data Acquisition), and SIEM (for Security Information and Event Management).
WHAT YOU WILL LEARN
-
Describe security assessment considerationsExplain the purpose of a vulnerability assessmentRun a network scan using nmap in windowsRun a network scan using nmap in linuxExplain the purpose of a penetration testDescribe how monitoring can enhance securityAdd metrics to a performance monitor chart
-
Use commands such as top to monitor performance in linuxDescribe how logging relates to securityFilter log events in the windows event viewerEnable rsyslog forwarding between linux hostsExplain scada and icsDefine how siem allows for the timely analysis of security eventsMonitor system performance to identify abnormal activity
IN THIS COURSE
-
2m 3s
-
4m 25sAfter completing this video, you will be able to describe security assessment considerations. FREE ACCESS
-
5m 13sAfter completing this video, you will be able to explain the purpose of a vulnerability assessment. FREE ACCESS
-
4m 19sIn this video, you will run a network scan using Nmap on Windows. FREE ACCESS
-
4m 54sIn this video, you will learn how to run a network scan using Nmap in Linux. FREE ACCESS
-
3m 33sAfter completing this video, you will be able to explain the purpose of a penetration test. FREE ACCESS
-
3m 10sAfter completing this video, you will be able to describe how monitoring can enhance security. FREE ACCESS
-
6m 12sIn this video, you will learn how to add metrics to a performance monitor chart. FREE ACCESS
-
7m 45sIn this video, find out how to use commands such as "top" to monitor performance in Linux. FREE ACCESS
-
4m 28sUpon completion of this video, you will be able to describe how logging relates to security. FREE ACCESS
-
5m 30sIn this video, you will learn how to filter log events in the Windows Event Viewer. FREE ACCESS
-
2m 28sFind out how to enable rsyslog forwarding between Linux and Windows hosts. FREE ACCESS
-
3m 9sAfter completing this video, you will be able to explain SCADA and ICS. FREE ACCESS
-
2m 16sIn this video, you will learn how SIEM allows for the timely analysis of security events. FREE ACCESS
-
2m 6sIn this video, you will monitor system performance to identify abnormal activity. FREE ACCESS
EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE
Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.
Digital badges are yours to keep, forever.