CompTIA Security+: Security Assessment & Penetration Testing Techniques

CompTIA Security+
  • 12 Videos | 41m 48s
  • Includes Assessment
  • Earns a Badge
Likes 42 Likes 42
It is important for security professionals to be aware of various security assessment and penetration testing techniques and methods. In this course, explore key assessment techniques like intelligence fusion, threat hunting, threat feeds, advisories and bulletins, vulnerability scans, and false positives/false negatives. You will also examine the fundamentals of penetration testing including black/blue/gray box methodologies, lateral movement , privilege escalation, persistence, and pivoting. Other topics include passive and active reconnaissance as well as the different exercise teams. This course can be used in preparation for the CompTIA Security+ SY0-601 certification exam.

WHAT YOU WILL LEARN

  • discover the key concepts covered in this course
    describe threat hunting concepts such as intelligence fusion, threat feeds, advisories, bulletins, and maneuvers
    survey vulnerability scanning terms like false positives, false negatives, and credentialed vs. non-credentialed
    define additional vulnerability scanning tools and techniques like common vulnerabilities and exposures (CVE), common vulnerability scoring system (CVSS), and configuration review
    compare syslog and SIEM system techniques such as review reports, packet captures, data inputs, user behavior analysis (UBA) and sentiment analysis
    describe the characteristics of security orchestration, automation, response (SOAR) systems
  • describe pen testing terms such as white box, black box, and gray box
    survey fundamental methods for pen testing like lateral movement, privilege escalation, persistence, and pivoting
    describe passive reconnaissance as it relates to pen testing as in drones/unmanned aerial vehicle (UAV), war flying, and war driving
    describe active reconnaissance techniques such as footprinting
    compare exercise teams as in red, blue, white, and purple teams
    discover the key concepts covered in this course

IN THIS COURSE

  • Playable
    1. 
    Course Overview
    1m 25s
    UP NEXT
  • Playable
    2. 
    Threat Hunting
    1m 46s
  • Locked
    3. 
    Vulnerability Scanning Terminology
    5m 4s
  • Locked
    4. 
    Vulnerability Scanning Tools
    4m 21s
  • Locked
    5. 
    Syslog and SIEM
    5m 13s
  • Locked
    6. 
    Security Orchestration, Automation, Response (SOAR)
    3m 12s
  • Locked
    7. 
    Penetration Testing Terminology
    2m 57s
  • Locked
    8. 
    Penetration Testing Fundamentals
    5m 45s
  • Locked
    9. 
    Passive Reconnaissance
    2m 14s
  • Locked
    10. 
    Active Reconnaissance
    1m 13s
  • Locked
    11. 
    Exercise Teams
    2m 54s
  • Locked
    12. 
    Course Summary
    43s

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion of this course, which can be shared on any social network or business platform

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE

PEOPLE WHO VIEWED THIS ALSO VIEWED THESE

Likes 463 Likes 463  
Likes 263 Likes 263