Final Exam: Forensics Analyst
- 1 video | 32s
- Includes Assessment
- Earns a Badge
Final Exam: Forensics Analyst will test your knowledge and application of the topics presented throughout the Forensics Analyst track of the Skillsoft Aspire Security Analyst to Security Architect Journey.
WHAT YOU WILL LEARN
define training and awarenessrecognize the benefits of an event focused risk management approachdefine the purpose of a CRL and how it worksconfigure certificate propertiesdescribe forth step in the RMF, assessing security control effectivenesslist keys to presenting risk to shareholders, such as soliciting stakeholder inputdescribe the first step of the NIST risk management framework, categorizing riskdescribe how SSL is used to secure web trafficdescribe ransomwarededuce activity of encrypted web trafficrecognize best practices and considerations when working with digital evidenceidentify beaconing activitydefine the goals of information securityrecognize possible conflicts of interest and how to avoid themdescribe how network forensics can be used to protect mission critical areas of businessdescribe approaches and techniques used when working with live or volatile data, such as confirming if encryption is in use and acquiring system memoryrecognize limitations of traditional approaches to anomaly detection, such as chasing false positivesdescribe shared responsibilitydifferentiate between criminal, civil, and intellectual property investigationsdescribe DoS and DDoS attacksdescribe data breaches and theftdescribe guidelines and standards for defining cyber security audit strategiesdifferentiate between legal authorization forms such as consent forms and warrantsdefine common symmetric encryption algorithmsrecognize the different types of forensics including computer, mobile, network, vehicle, and IoTrecognize steps to properly test software to ensure it is securedescribe asymmetric encryptiondifferentiate between different risk responses such as accepting, avoiding, mitigating, sharing, or transferring riskdefine what is considered a reasonable expectation of privacydescribe next-generation EDR
recognize the different standards for analyzing digital evidencedefine cryptojackingclassify authentication technologiescompare audit review, analysis, and reportingdescribe 802.1x and MACsecdifferentiate between least frequency of occurrence and baseliningrecognize concepts and applications of network behavior anomaly detectionprovide an overview of population analysisrecognize how viruses and other malware workrecognize different anomalies or outliers, such as configuration faults or a malicious presencedifferentiate between threats, vulnerabilities, impacts, and risksdefine common hashing algorithmsdescribe cryptography services and associate those services with the goals of information securitydescribe how to monitor the Linux system by reviewing system logsdescribe how SSL is useddefine e-mail security basicsdescribe a certificate and the different types of certificatesrecognize legalities surrounding digital forensics investigative techniquesdescribe symmetric encryptiondescribe how to perform web application auditing and secure web application and web sitesdescribe the importance of a security management process and its common functionslist common software vulnerabilities such as buffer overflow and injection flawsprovide an overview of digital forensicsdistinguish physical security controlsprotect data in storagedescribe audit review, analysis, and reportingrecognize steps and techniques to analyze riskcompare available security audit tools and outline their features and benefitsprovide an overview of microservices and APIs and highlight security concerns associated to eachrecognize the benefits of using auto-periodicity to aid in identifying anomalies
IN THIS COURSE
EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE
Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.Digital badges are yours to keep, forever.
YOU MIGHT ALSO LIKE
Course Final Exam: Graph Analytics
PEOPLE WHO VIEWED THIS ALSO VIEWED THESE