CompTIA Security+: Organizational Security Assessment Tools & Mitigation Controls

CompTIA    |    Intermediate
  • 12 videos | 43m 36s
  • Includes Assessment
  • Earns a Badge
Rating 4.4 of 108 users Rating 4.4 of 108 users (108)
To prepare for the CompTIA Security+ SY0-601 certification exam, you will need to identify and describe popular organizational security assessment tools and risk mitigation controls. You will likely come across these tools at some point in your career, so prior knowledge of how these work and what they're used for will be highly beneficial. In this CompTIA Security+ SY0-601 course, you'll explore the concept of network reconnaissance and discovery, and examine packet capture and replay, file manipulation, and forensic tools. You'll also identify shell and script environments, exploitation kits, and password crackers. You'll move on to recognize methods for reconfiguring endpoint security solutions and describe configuration changes for mitigation, the concepts of isolation, containment, and segmentation, and secure orchestration, automation, and response (SOAR) solutions. This course can be used in preparation for the CompTIA Security+ SY0-601 certification exam.

WHAT YOU WILL LEARN

  • Discover the key concepts covered in this course
    Describe the following network reconnaissance and discovery tools: tracert/traceroute, nslookup/dig, ipconfig/ifconfig, nmap, ping/pathping, hping, netstat, netcat, arp, route, curl, theharvester, sn1per, dnsenum, nessus, and cuckoo
    Compare the following packet capture and replay tools: tcpreplay, tcpdump, and wireshark
    Survey file manipulation tools, as in head, tail, cat, grep, chmod, and logger
    Describe shell and script environments like ssh, powershell, python, and openssl
    Compare various forensic tools like dd, memdump, winhex, ftk imager, and autopsy
  • Describe exploitation frameworks, exploitation kits, and various password crackers like john the ripper and cain
    Describe methods for reconfiguring endpoint security solutions, like application whitelisting, blacklisting, and quarantine
    Define configuration changes for mitigation, like firewall rules, mdm, dlp, content and url filtering, and updating or revoking certificates
    Describe the mitigation concepts of isolation, containment, and segmentation with popular use cases
    Define the concept of secure orchestration, automation, and response (soar) and its associated runbooks and playbooks
    Summarize the key concepts covered in this course

IN THIS COURSE

  • 1m 38s
  • 12m 19s
    After completing this video, you will be able to describe the following network reconnaissance and discovery tools: tracert/traceroute, nslookup/dig, ipconfig/ifconfig, Nmap, ping/pathping, hping, netstat, netcat, arp, route, curl, theHarvester, sn1per, DNSenum, Nessus, and Cuckoo. FREE ACCESS
  • Locked
    3.  Packet Capture and Replay Tools
    2m 30s
    In this video, you will learn how to compare the following packet capture and replay tools: Tcpreplay, Tcpdump, and Wireshark. FREE ACCESS
  • Locked
    4.  File Manipulation Tools
    2m 23s
    In this video, learn how to survey file manipulation tools, such as head, tail, cat, grep, chmod, and logger. FREE ACCESS
  • Locked
    5.  Shell and Script Environments
    3m 21s
    After completing this video, you will be able to describe shell and script environments such as SSH, PowerShell, Python, and OpenSSL. FREE ACCESS
  • Locked
    6.  Forensic Tools
    4m 8s
    Find out how to compare various forensic tools, like dd, Memdump, WinHex, FTK Imager, and Autopsy. FREE ACCESS
  • Locked
    7.  Exploitation Kits and Password Crackers
    4m 14s
    Upon completion of this video, you will be able to describe exploitation frameworks, exploitation kits, and various password crackers like John the Ripper and Cain. FREE ACCESS
  • Locked
    8.  Endpoint Security Solution Reconfiguration Methods
    3m 4s
    Upon completion of this video, you will be able to describe methods for reconfiguring endpoint security solutions, like application whitelisting, blacklisting, and quarantine. FREE ACCESS
  • Locked
    9.  Configuration Changes for Mitigation
    2m 43s
    Learn how to define configuration changes for mitigation, such as firewall rules, MDM, DLP, content and URL filtering, and updating or revoking certificates. FREE ACCESS
  • Locked
    10.  Isolation, Containment, and Segmentation
    3m 37s
    Upon completion of this video, you will be able to describe the mitigation concepts of isolation, containment, and segmentation, with popular use cases. FREE ACCESS
  • Locked
    11.  Secure Orchestration, Automation, and Response (SOAR)
    2m 56s
    Find out how to define the concept of secure orchestration, automation, and response (SOAR) and its associated runbooks and playbooks. FREE ACCESS
  • Locked
    12.  Course Summary
    45s

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE

Rating 4.6 of 48 users Rating 4.6 of 48 users (48)
Rating 4.6 of 30 users Rating 4.6 of 30 users (30)
Rating 4.5 of 4 users Rating 4.5 of 4 users (4)

PEOPLE WHO VIEWED THIS ALSO VIEWED THESE

Rating 4.5 of 157 users Rating 4.5 of 157 users (157)
Rating 4.5 of 1341 users Rating 4.5 of 1341 users (1341)
Rating 3.5 of 302 users Rating 3.5 of 302 users (302)