CompTIA Security+: Organizational Security Assessment Tools & Mitigation Controls

CompTIA Security+    |    Intermediate
  • 12 Videos | 48m 36s
  • Includes Assessment
  • Earns a Badge
Likes 23 Likes 23
To prepare for the CompTIA Security+ SY0-601 certification exam, you will need to identify and describe popular organizational security assessment tools and risk mitigation controls. You will likely come across these tools at some point in your career, so prior knowledge of how these work and what they're used for will be highly beneficial. In this CompTIA Security+ SY0-601 course, you'll explore the concept of network reconnaissance and discovery, and examine packet capture and replay, file manipulation, and forensic tools. You'll also identify shell and script environments, exploitation kits, and password crackers. You'll move on to recognize methods for reconfiguring endpoint security solutions and describe configuration changes for mitigation, the concepts of isolation, containment, and segmentation, and secure orchestration, automation, and response (SOAR) solutions. This course can be used in preparation for the CompTIA Security+ SY0-601 certification exam.

WHAT YOU WILL LEARN

  • discover the key concepts covered in this course
    describe the following network reconnaissance and discovery tools: tracert/traceroute, nslookup/dig, ipconfig/ifconfig, Nmap, ping/pathping, hping, netstat, netcat, arp, route, curl, theHarvester, sn1per, DNSenum, Nessus, and Cuckoo
    compare the following packet capture and replay tools: Tcpreplay, Tcpdump, and Wireshark
    survey file manipulation tools, as in head, tail, cat, grep, chmod, and logger
    describe shell and script environments like SSH, PowerShell, Python, and OpenSSL
    compare various forensic tools like dd, Memdump, WinHex, FTK Imager, and Autopsy
  • describe exploitation frameworks, exploitation kits, and various password crackers like John the Ripper and Cain
    describe methods for reconfiguring endpoint security solutions, like application whitelisting, blacklisting, and quarantine
    define configuration changes for mitigation, like firewall rules, MDM, DLP, content and URL filtering, and updating or revoking certificates
    describe the mitigation concepts of isolation, containment, and segmentation with popular use cases
    define the concept of secure orchestration, automation, and response (SOAR) and its associated runbooks and playbooks
    summarize the key concepts covered in this course

IN THIS COURSE

  • Playable
    1. 
    Course Overview
    1m 38s
    UP NEXT
  • Playable
    2. 
    Network Reconnaissance and Discovery
    12m 19s
  • Locked
    3. 
    Packet Capture and Replay Tools
    2m 30s
  • Locked
    4. 
    File Manipulation Tools
    2m 23s
  • Locked
    5. 
    Shell and Script Environments
    3m 21s
  • Locked
    6. 
    Forensic Tools
    4m 8s
  • Locked
    7. 
    Exploitation Kits and Password Crackers
    4m 14s
  • Locked
    8. 
    Endpoint Security Solution Reconfiguration Methods
    3m 4s
  • Locked
    9. 
    Configuration Changes for Mitigation
    2m 43s
  • Locked
    10. 
    Isolation, Containment, and Segmentation
    3m 37s
  • Locked
    11. 
    Secure Orchestration, Automation, and Response (SOAR)
    2m 56s
  • Locked
    12. 
    Course Summary
    45s

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion of this course, which can be shared on any social network or business platform

Digital badges are yours to keep, forever.