SKILL BENCHMARK
SecOps Proficiency (Advanced Level)
- 31m 58s
- 32 questions
The SecOps Proficiency benchmark measures whether a learner has an advanced understanding of the SecOps practice, with additional experience with SecOps tools and processes. A learner who scores high on this benchmark demonstrates professional proficiency in all of the major areas of the SecOps discipline, across a variety of different platforms and deployments. This learner works and acts almost 100% independently of others, and is seen as a leader in the industry.
Topics covered
- apply risk management standards according to NIST 800-37
- assess security vulnerabilities using CVSS
- calculate risk levels in a quantitative manner
- compare vulnerability to penetration testing and describe the function of each
- describe and use DREAD, PASTA, and other risk models
- describe black box penetration testing and why it may be used
- describe cryptography and its four goals
- describe grey box penetration testing and why it may be used
- describe how indicators of compromise can help reduce exploits in an environment
- describe how to find a vulnerability using scanners and other techniques
- describe organizational risk tolerance and why it is important
- describe policies and procedures for keeping systems secure in preemptive troubleshooting
- describe preemptive troubleshooting and how it applies to security and SecOps
- describe the COBIT 5 standard
- describe the common types of penetration and the importance of testing each type
- describe the different categories of findings
- describe the importance of setting stopping points and when to stop a penetration test
- describe the rules of engagement and how they are used
- describe what should be documented during a penetration test and why it is important
- describe white box penetration testing and why it may be used
- differentiate between malware types and recognize some of the consequences of using targeted malware
- differentiate between scanning and enumeration
- differentiate between symmetric and asymmetric cryptography
- evaluate security in accordance with ISO/IEC 18045
- identify and implement specific responses to risk
- recognize how preemptive troubleshooting is different than intrusion detection systems
- recognize how to choose a password cracking technique
- update hardware and recognize the importance of doing so
- update software and recognize the importance of doing so
- use password policies to enforce compliance
- use tools to troubleshoot hardware and policies to prevent security compromise
- utilize the CIA triangle and the McCumber cube to assess risks and threats