Final Exam: Ethical Hacker
- 1 Video | 30m 32s
- Includes Assessment
- Earns a Badge
Final Exam: Ethical Hacker will test your knowledge and application of the topics presented throughout the Ethical Hacker track of the Skillsoft Aspire Penetration Tester to SecOps Engineer Journey.
WHAT YOU WILL LEARN
apply basic incident response forensics including imaging a drive and basic legal standardsapply risk management standards according to NIST 800-37apply the NSA-IAM to ethical hacking to plan, execute, and report on your ethical hacking projectapply the PTES to ethical hacking to plan, execute, and report on your ethical hacking projectassess security vulnerabilities using CVSScalculate risk levels in a quantitative mannerconduct an after-action review of incident responseconduct recovery and remediation activitiesconfigure the firewall in Windows 10 and Windows Server 2019configure Windows Defendercorrectly deploy firewall solutions and describe their relevance to ethical hackingcreate a response plan for cyber incidentscreate a response plan for physical incidentsdescribe ABAC and its advantages over standard access controldescribe and apply basic incident response forensics including evidence handling and basic techniquesdescribe and implement ISO 27001describe and implement MAC, DAC, and RBACdescribe and use DREAD, PASTA, and other risk modelsdescribe antivirus concepts and implement an AV strategydescribe cross-site scriptingdescribe how steganography worksdescribe IDS/IPS and describe its relation to ethical hackingdescribe incident response conceptsdescribe malware threatsdescribe NIST 800-14 security protocolsdescribe NMAP and how it can be useddescribe PCI-DSS standards and integrate them into ethical hackingdescribe secure software conceptsdescribe security devices and how they relate to ethical hackingdescribe SQL injection and variations
describe the COBIT 5 standarddescribe the Shodan search engine, its purpose and usage, and the role it plays in ethical hacking and penetration testingdescribe the usage of SIEM and deploy SIEM systemsdescribe types of malwaredesign access control and account management processesemploy NIST 800-26 standards to manage IT securityevaluate security in accordance with ISO/IEC 18045execute basic Metasploit commandsexecute basic SQL Injectionidentify and implement specific responses to riskimplement basic Snort IDSinterpret and apply NIST 800-12properly apply filtering and data validationproperly classify and describe different types of incidentsrecall the basics of Metasploitrecognize account creation conceptsrecognize NMAP and how it can be usedrecognize SQL injection and variationsrecognize types of DoS and associated countermeasuresrecognize types of malwareuse common steganography toolsuse common Windows hacking techniquesuse multiple informational web sites to gain information about a targetuse NMAP to scan a target system or networkuse OWASP ZAP to scan a target web siteuse Shodan to gather information about vulnerabilitiesuse Vega to scan a target web siteuse web sites to gain information about a targetutilize IDS/IPS and describe its relation to ethical hackingutilize the CIA triangle and the McCumber cube to assess risks and threats
IN THIS COURSE
1.Ethical Hacker33sUP NEXT
EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE
Skillsoft is providing you the opportunity to earn a digital badge upon successful completion of this course, which can be shared on any social network or business platformDigital badges are yours to keep, forever.