Final Exam: Forensics Analyst
- 1 Video | 30m 32s
- Includes Assessment
- Earns a Badge
Final Exam: Forensics Analyst will test your knowledge and application of the topics presented throughout the Forensics Analyst track of the Skillsoft Aspire Security Analyst to Security Architect Journey.
WHAT YOU WILL LEARN
classify authentication technologiescompare audit review, analysis, and reportingcompare available security audit tools and outline their features and benefitsconfigure certificate propertiesdeduce activity of encrypted web trafficdefine common hashing algorithmsdefine common symmetric encryption algorithmsdefine cryptojackingdefine e-mail security basicsdefine the goals of information securitydefine the purpose of a CRL and how it worksdefine training and awarenessdefine what is considered a reasonable expectation of privacydescribe 802.1x and MACsecdescribe a certificate and the different types of certificatesdescribe approaches and techniques used when working with live or volatile data, such as confirming if encryption is in use and acquiring system memorydescribe asymmetric encryptiondescribe audit review, analysis, and reportingdescribe cryptography services and associate those services with the goals of information securitydescribe data breaches and theftdescribe DoS and DDoS attacksdescribe forth step in the RMF, assessing security control effectivenessdescribe guidelines and standards for defining cyber security audit strategiesdescribe how network forensics can be used to protect mission critical areas of businessdescribe how SSL is useddescribe how SSL is used to secure web trafficdescribe how to monitor the Linux system by reviewing system logsdescribe how to perform web application auditing and secure web application and web sitesdescribe next-generation EDRdescribe ransomware
describe shared responsibilitydescribe symmetric encryptiondescribe the first step of the NIST risk management framework, categorizing riskdescribe the importance of a security management process and its common functionsdifferentiate between criminal, civil, and intellectual property investigationsdifferentiate between different risk responses such as accepting, avoiding, mitigating, sharing, or transferring riskdifferentiate between least frequency of occurrence and baseliningdifferentiate between legal authorization forms such as consent forms and warrantsdifferentiate between threats, vulnerabilities, impacts, and risksdistinguish physical security controlsidentify beaconing activitylist common software vulnerabilities such as buffer overflow and injection flawslist keys to presenting risk to shareholders, such as soliciting stakeholder inputprotect data in storageprovide an overview of digital forensicsprovide an overview of microservices and APIs and highlight security concerns associated to eachprovide an overview of population analysisrecognize best practices and considerations when working with digital evidencerecognize concepts and applications of network behavior anomaly detectionrecognize different anomalies or outliers, such as configuration faults or a malicious presencerecognize how viruses and other malware workrecognize legalities surrounding digital forensics investigative techniquesrecognize limitations of traditional approaches to anomaly detection, such as chasing false positivesrecognize possible conflicts of interest and how to avoid themrecognize steps and techniques to analyze riskrecognize steps to properly test software to ensure it is securerecognize the benefits of an event focused risk management approachrecognize the benefits of using auto-periodicity to aid in identifying anomaliesrecognize the different standards for analyzing digital evidencerecognize the different types of forensics including computer, mobile, network, vehicle, and IoT
IN THIS COURSE
1.Forensics Analyst33sUP NEXT
EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE
Skillsoft is providing you the opportunity to earn a digital badge upon successful completion of this course, which can be shared on any social network or business platformDigital badges are yours to keep, forever.