CompTIA Security+: Security Assessment & Penetration Testing Techniques
CompTIA Security+
| Intermediate
- 12 videos | 36m 48s
- Includes Assessment
- Earns a Badge
It is important for security professionals to be aware of various security assessment and penetration testing techniques and methods. In this course, explore key assessment techniques like intelligence fusion, threat hunting, threat feeds, advisories and bulletins, vulnerability scans, and false positives/false negatives. You will also examine the fundamentals of penetration testing including black/blue/gray box methodologies, lateral movement , privilege escalation, persistence, and pivoting. Other topics include passive and active reconnaissance as well as the different exercise teams. This course can be used in preparation for the CompTIA Security+ SY0-601 certification exam.
WHAT YOU WILL LEARN
-
discover the key concepts covered in this coursedescribe threat hunting concepts such as intelligence fusion, threat feeds, advisories, bulletins, and maneuverssurvey vulnerability scanning terms like false positives, false negatives, and credentialed vs. non-credentialeddefine additional vulnerability scanning tools and techniques like common vulnerabilities and exposures (CVE), common vulnerability scoring system (CVSS), and configuration reviewcompare syslog and SIEM system techniques such as review reports, packet captures, data inputs, user behavior analysis (UBA) and sentiment analysisdescribe the characteristics of security orchestration, automation, response (SOAR) systems
-
describe pen testing terms such as white box, black box, and gray boxsurvey fundamental methods for pen testing like lateral movement, privilege escalation, persistence, and pivotingdescribe passive reconnaissance as it relates to pen testing as in drones/unmanned aerial vehicle (UAV), war flying, and war drivingdescribe active reconnaissance techniques such as footprintingcompare exercise teams as in red, blue, white, and purple teamsdiscover the key concepts covered in this course
IN THIS COURSE
-
1.Course Overview1m 25sUP NEXT
-
2.Threat Hunting1m 46s
-
3.Vulnerability Scanning Terminology5m 4s
-
4.Vulnerability Scanning Tools4m 21s
-
5.Syslog and SIEM5m 13s
-
6.Security Orchestration, Automation, Response (SOAR)3m 12s
-
7.Penetration Testing Terminology2m 57s
-
8.Penetration Testing Fundamentals5m 45s
-
9.Passive Reconnaissance2m 14s
-
10.Active Reconnaissance1m 13s
-
11.Exercise Teams2m 54s
-
12.Course Summary43s
EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE
Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.
Digital badges are yours to keep, forever.