CompTIA Security+: Security Assessment & Penetration Testing Techniques

CompTIA    |    Intermediate
  • 12 videos | 36m 48s
  • Includes Assessment
  • Earns a Badge
Rating 4.5 of 441 users Rating 4.5 of 441 users (441)
It is important for security professionals to be aware of various security assessment and penetration testing techniques and methods. In this course, explore key assessment techniques like intelligence fusion, threat hunting, threat feeds, advisories and bulletins, vulnerability scans, and false positives/false negatives. You will also examine the fundamentals of penetration testing including black/blue/gray box methodologies, lateral movement , privilege escalation, persistence, and pivoting. Other topics include passive and active reconnaissance as well as the different exercise teams. This course can be used in preparation for the CompTIA Security+ SY0-601 certification exam.

WHAT YOU WILL LEARN

  • Discover the key concepts covered in this course
    Describe threat hunting concepts such as intelligence fusion, threat feeds, advisories, bulletins, and maneuvers
    Survey vulnerability scanning terms like false positives, false negatives, and credentialed vs. non-credentialed
    Define additional vulnerability scanning tools and techniques like common vulnerabilities and exposures (cve), common vulnerability scoring system (cvss), and configuration review
    Compare syslog and siem system techniques such as review reports, packet captures, data inputs, user behavior analysis (uba) and sentiment analysis
    Describe the characteristics of security orchestration, automation, response (soar) systems
  • Describe pen testing terms such as white box, black box, and gray box
    Survey fundamental methods for pen testing like lateral movement, privilege escalation, persistence, and pivoting
    Describe passive reconnaissance as it relates to pen testing as in drones/unmanned aerial vehicle (uav), war flying, and war driving
    Describe active reconnaissance techniques such as footprinting
    Compare exercise teams as in red, blue, white, and purple teams
    Discover the key concepts covered in this course

IN THIS COURSE

  • 1m 25s
  • 1m 46s
    After completing this video, you will be able to describe threat hunting concepts such as intelligence fusion, threat feeds, advisories, bulletins, and maneuvers. FREE ACCESS
  • Locked
    3.  Vulnerability Scanning Terminology
    5m 4s
    In this video, learn how to survey vulnerability scanning terms like false positives, false negatives, and credentialed vs. non-credentialed. FREE ACCESS
  • Locked
    4.  Vulnerability Scanning Tools
    4m 21s
    In this video, find out how to define additional vulnerability scanning tools and techniques like common vulnerabilities and exposures (CVE), common vulnerability scoring system (CVSS), and configuration review. FREE ACCESS
  • Locked
    5.  Syslog and SIEM
    5m 13s
    In this video, find out how to compare syslog and SIEM system techniques, such as review reports, packet captures, data inputs, user behavior analysis (UBA), and sentiment analysis. FREE ACCESS
  • Locked
    6.  Security Orchestration, Automation, Response (SOAR)
    3m 12s
    After completing this video, you will be able to describe the characteristics of security orchestration, automation, and response (SOAR) systems. FREE ACCESS
  • Locked
    7.  Penetration Testing Terminology
    2m 57s
    After completing this video, you will be able to describe pen testing terms such as white hat, black hat, and gray hat. FREE ACCESS
  • Locked
    8.  Penetration Testing Fundamentals
    5m 45s
    During this video, you will learn how to survey fundamental methods for pen testing like lateral movement, privilege escalation, persistence, and pivoting. FREE ACCESS
  • Locked
    9.  Passive Reconnaissance
    2m 14s
    After completing this video, you will be able to describe passive reconnaissance as it relates to pen testing using drones/unmanned aerial vehicles (UAVs), war flying, and war driving. FREE ACCESS
  • Locked
    10.  Active Reconnaissance
    1m 13s
    Upon completion of this video, you will be able to describe active reconnaissance techniques, such as footprinting. FREE ACCESS
  • Locked
    11.  Exercise Teams
    2m 54s
    In this video, learn how to compare exercise teams such as red, blue, white, and purple teams. FREE ACCESS
  • Locked
    12.  Course Summary
    43s

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE

Rating 4.6 of 13 users Rating 4.6 of 13 users (13)
Rating 4.4 of 38 users Rating 4.4 of 38 users (38)
Rating 4.6 of 2143 users Rating 4.6 of 2143 users (2143)

PEOPLE WHO VIEWED THIS ALSO VIEWED THESE

Rating 4.5 of 483 users Rating 4.5 of 483 users (483)
Rating 4.5 of 157 users Rating 4.5 of 157 users (157)
Rating 4.4 of 197 users Rating 4.4 of 197 users (197)