Final Exam: Security Analyst
1 Video | 30m 32s
- Includes Assessment
- Earns a Badge
Final Exam: Security Analyst will test your knowledge and application of the topics presented throughout the Security Analyst track of the Skillsoft Aspire Security Analyst to Security Architect Journey.
WHAT YOU WILL LEARN
classify the various types of honeypots that can be usedclassify the various types of security protocolscompare governance and managementcompare pen testing and vulnerability assessmentscompare the types of risk responses that an organization may adaptcompare the various types of honeypots that can be usedcompare VMs and containerscompare VMs and containers characteristicsconfigure a VPN to protect dataconfigure a VPN to protect data in motionconfigure file encryption to protect data at restdefine an Advanced Persistent Threat and its purposedefine continuous security monitoring and list its benefitsdefine the risk assessment processes that can help you protect your assetsdefine the secure DevOps lifecycledescribe best practices for working with and handling corporate information while travelingdescribe honeypot usesdescribe how employee training, awareness, and advocacy should be implemented and how it plays a crucial role in the protection of an organization's informationdescribes the benefits of Continuous Securitydescribe subnetting and its advantagesdescribe the characteristics of APTs as well as their goals and objectivesdescribe the elements used in designing goals of a security topologydescribe the importance of securing mobile devicesdescribe the motives behind an APT and the probable targetsdescribe the process of rolling out a security governance programdescribe the role physical security plays in the protection of corporate datadescribe the target selection for pen testingdescribe the various types of DNS attacks and their mitigationsdescribe types of security topologiesdiscover the key concepts covered in this course
discuss network demilitarized zones and how they help protect corporate informationdiscuss the problems presented by organizational and personal e-mail, and best practices for working with e-mail, including how to protect yourself from spamdistinguish between governance and managementdistinguish between pen testing and vulnerability assessmentsidentify the key point for creating an effective checklist for NAC Securityidentify the phases of the secure DevOps lifecycleidentify the risks introduced by BYOD and IoT along with their preventive measuresidentify the security risks introduced by BYOD and IoTidentify the security risks introduced by BYOD and IoT along with their preventive measuresidentify the threat actorsidentify the types of weak protocols and their replacementsidentify the various roles and responsibilities of senior management in governanceidentify the various types of security protocolsidentify the various types of tools used in pen testinglist best practices related to IT security auditinglist the NAC authentication methodslist the steps of the APT lifecyclelist the threats, vulnerabilities, and mitigation techniques in a network securityrecognize how HTTP session management can affect securityrecognize the deployment strategies of a honeypotscan hosts for security weaknesses from Linuxspecify how honeypots are placed in a networkspecify how social engineering is conducted and how it can be mitigated through corporate policyspecify the importance of implementing organizational security programs and why companies that don't have them put themselves at riskspecify the proper ways to handle sensitive company information, including the differences between working with online data and physical mediaspecify the top kinds of security threats facing organizations todayspecify what network hardening is and how it relates to the protection of corporate informationuse Group Policy to enable file system auditinguse Group Policy to implement user account hardeningview a packet capture to identify suspicious activity
IN THIS COURSE
1.Security Analyst33sUP NEXT
EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE
Skillsoft is providing you the opportunity to earn a digital badge upon successful completion of this course, which can be shared on any social network or business platformDigital badges are yours to keep, forever.