Ethical Hacker: Security Standards

Intermediate
  • 11 videos | 39m 52s
  • Includes Assessment
  • Earns a Badge
Rating 4.5 of 69 users Rating 4.5 of 69 users (69)
Ethical hacking is not just random hacking attempts; it is a systematic testing of the target's security. For that reason, an understanding of security standards and formal testing methodologies is critical. Key concepts covered in this 11-video course include security standards such as NIST 800-115, a security standard which is integrally interconnected with ethical hacking and testing; and NIST 800-53, a security standard that can help users to professionalize and improve an ethical hacking test. Next, learn how to properly apply filtering and data validation; how to apply the NSA-IAM to ethical hacking to plan, execute, and report on your ethical hacking project; and how to apply the PTES to ethical hacking to plan, execute, and report on your ethical hacking project. Then learn about PCI-DSS standards and how to integrate them into ethical hacking; learn how to implement ISO 27001; and learn to interpret and apply NIST 800-12. Finally, learners observe how to employ NIST 800-26 standards to manage IT security; and learn about NIST 800-14 security protocols.

WHAT YOU WILL LEARN

  • Discover the key concepts covered in this course
    Describe secure software concepts
    Properly apply filtering and data validation
    Apply the nsa-iam to ethical hacking to plan, execute, and report on your ethical hacking project
    Apply the ptes to ethical hacking to plan, execute, and report on your ethical hacking project
    Describe pci-dss standards and integrate them into ethical hacking
  • Describe and implement iso 27001
    Interpret and apply nist 800-12
    Employ nist 800-26 standards to manage it security
    Describe nist 800-14 security protocols
    Summarize the key concepts covered in this course

IN THIS COURSE

  • 1m 14s
  • 5m 20s
    Upon completion of this video, you will be able to describe secure software concepts. FREE ACCESS
  • Locked
    3.  NIST 800-53 A Security Standard
    3m 56s
    In this video, you will learn how to apply filtering and data validation properly. FREE ACCESS
  • Locked
    4.  NSA Information Assessment Methodology
    5m 20s
    In this video, find out how to apply the National Security Agency's Information Assurance Methodology to ethical hacking to plan, execute, and report on your ethical hacking project. FREE ACCESS
  • Locked
    5.  The Pen Testing Execution Standard
    3m 28s
    In this video, learn how to use the PTES to plan, execute, and report on your ethical hacking project. FREE ACCESS
  • Locked
    6.  PCI-DSS
    4m 45s
    Upon completion of this video, you will be able to describe PCI-DSS standards and integrate them into your ethical hacking. FREE ACCESS
  • Locked
    7.  ISO/IEC 27001 Security Standard
    3m 48s
    After completing this video, you will be able to describe and implement the ISO 27001 standard. FREE ACCESS
  • Locked
    8.  NIST 800-12 Security Standard
    3m 15s
    In this video, find out how to interpret and apply the National Institute of Standards and Technology's 800-12. FREE ACCESS
  • Locked
    9.  NIST 800-26 Security Standard
    2m 28s
    In this video, you will learn how to use NIST 800-26 standards to manage IT security. FREE ACCESS
  • Locked
    10.  NIST 800-14 Security Standard
    4m 32s
    Upon completion of this video, you will be able to describe NIST 800-14 security protocols. FREE ACCESS
  • Locked
    11.  Course Summary
    1m 46s

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE

Rating 4.8 of 30 users Rating 4.8 of 30 users (30)
Rating 4.4 of 27 users Rating 4.4 of 27 users (27)
Rating 4.4 of 5 users Rating 4.4 of 5 users (5)

PEOPLE WHO VIEWED THIS ALSO VIEWED THESE

Rating 4.3 of 91 users Rating 4.3 of 91 users (91)
Rating 4.6 of 62 users Rating 4.6 of 62 users (62)
Rating 4.4 of 53 users Rating 4.4 of 53 users (53)