Final Exam: Security Analyst

  • 1 Video | 30m 32s
  • Includes Assessment
  • Earns a Badge
Likes 5 Likes 5
Final Exam: Security Analyst will test your knowledge and application of the topics presented throughout the Security Analyst track of the Skillsoft Aspire Security Analyst to Security Architect Journey.


  • classify the various types of honeypots that can be used
    classify the various types of security protocols
    compare governance and management
    compare pen testing and vulnerability assessments
    compare the types of risk responses that an organization may adapt
    compare the various types of honeypots that can be used
    compare VMs and containers
    compare VMs and containers characteristics
    configure a VPN to protect data
    configure a VPN to protect data in motion
    configure file encryption to protect data at rest
    define an Advanced Persistent Threat and its purpose
    define continuous security monitoring and list its benefits
    define the risk assessment processes that can help you protect your assets
    define the secure DevOps lifecycle
    describe best practices for working with and handling corporate information while traveling
    describe honeypot uses
    describe how employee training, awareness, and advocacy should be implemented and how it plays a crucial role in the protection of an organization's information
    describes the benefits of Continuous Security
    describe subnetting and its advantages
    describe the characteristics of APTs as well as their goals and objectives
    describe the elements used in designing goals of a security topology
    describe the importance of securing mobile devices
    describe the motives behind an APT and the probable targets
    describe the process of rolling out a security governance program
    describe the role physical security plays in the protection of corporate data
    describe the target selection for pen testing
    describe the various types of DNS attacks and their mitigations
    describe types of security topologies
    discover the key concepts covered in this course
  • discuss network demilitarized zones and how they help protect corporate information
    discuss the problems presented by organizational and personal e-mail, and best practices for working with e-mail, including how to protect yourself from spam
    distinguish between governance and management
    distinguish between pen testing and vulnerability assessments
    identify the key point for creating an effective checklist for NAC Security
    identify the phases of the secure DevOps lifecycle
    identify the risks introduced by BYOD and IoT along with their preventive measures
    identify the security risks introduced by BYOD and IoT
    identify the security risks introduced by BYOD and IoT along with their preventive measures
    identify the threat actors
    identify the types of weak protocols and their replacements
    identify the various roles and responsibilities of senior management in governance
    identify the various types of security protocols
    identify the various types of tools used in pen testing
    list best practices related to IT security auditing
    list the NAC authentication methods
    list the steps of the APT lifecycle
    list the threats, vulnerabilities, and mitigation techniques in a network security
    recognize how HTTP session management can affect security
    recognize the deployment strategies of a honeypot
    scan hosts for security weaknesses from Linux
    specify how honeypots are placed in a network
    specify how social engineering is conducted and how it can be mitigated through corporate policy
    specify the importance of implementing organizational security programs and why companies that don't have them put themselves at risk
    specify the proper ways to handle sensitive company information, including the differences between working with online data and physical media
    specify the top kinds of security threats facing organizations today
    specify what network hardening is and how it relates to the protection of corporate information
    use Group Policy to enable file system auditing
    use Group Policy to implement user account hardening
    view a packet capture to identify suspicious activity


  • Playable
    Security Analyst


Skillsoft is providing you the opportunity to earn a digital badge upon successful completion of this course, which can be shared on any social network or business platform

Digital badges are yours to keep, forever.


Likes 3 Likes 3  
Likes 2 Likes 2  
Likes 3 Likes 3