Final Exam: Security Architect
1 Video | 30m 32s
- Includes Assessment
- Earns a Badge
Final Exam: Security Architect will test your knowledge and application of the topics presented throughout the Security Architect track of the Skillsoft Aspire Security Analyst to Security Architect Journey.
WHAT YOU WILL LEARN
analyze DNS activity and describe security events to look foranalyze system log activity and describe security events to look forcompare ethical hacking tools such as Nmap, Wireshark, Metasploit, and Kali Linuxcompare the relevance of security baselines, compliance reports, and regulatory complianceconfigure an IPS to protect a system with an Ansible playbookconfigure unattended upgrades with an Ansible playbook to keep a system up to datedescribe approaches to detecting anomalies and handling them with security triagedescribe automation techniques in security triagedescribe best practices you should outline in the event that testing is successful or unsuccessfuldescribe common protocol anomalies that require triagedescribe common risks and limitations you should outline such as impact on systems, and ensuring backups are available and the disaster recovery plan is intactdescribe common tips and rules of thumb for security triagedescribe elements that should be included in a final report such as actions taken, problems, and findingsdescribe how proactive ethical hacking can build better overall security through vulnerability assessmentsdescribe how SIEM allows for centralized security event monitoringdescribe how to ensure proper authority has been granted to commence any testing, such as obtaining signatures from key stakeholdersdescribe of the benefits of having a easy reference checklist or templates prepared when defining RoEdescribe PII and PHIdescribe some of the challenges in implementing security playbooksdescribe the concepts of security triage and strategies to implement triagedescribe the importance of communication and stakeholder management in security triagedescribe the important elements needed in a security playbookdescribe the tools used in security triagedescribe the transition to playbooks and services in the clouddescribe the use of automation to improve consistency for security practicesdescribe various approaches to security through playbooksdescribe warranty, limitation of liability, and indemnification considerations to include when outlining the intent of testing activities, as well as and any liability concernsdiscuss the Digital Privacy Act and breach response obligations and focus areas for the compliance plandiscuss the General Data Protection Regulation breach guidelines and stakeholder response obligationsdiscuss the Gramm Leach Bliley Act breach guidelines and stakeholder response obligations
discuss the HIPAA breach guidelines and stakeholder response obligationsexecute a simple Ansible playbookidentify common types of security data breaches and how the notification process is different for each typeidentify security solutionsidentify security solutions that align with business objectivesidentify stakeholders that need to be notified during a security breach incident and best practices for notifying themidentify the best practice for creating a data privacy breach plan and notifying stakeholdersidentify the relevance of security baselines, compliance reports, and regulatory complianceidentify the sections of the data breach response plan and why it is important to have oneinstall Ansible and remotely execute commands on a managed hostlist common ethical hacking tools such as Nmap, Wireshark, Metasploit, and Kali Linuxlist different types of ethical hacking such as web application, system hacking, web server, wireless, and social engineeringlist different types of real-world hackers such as white hat, black hat, and grey hatlist key logistical considerations such as testing tools, personnel, and test schedulesplan how security can be implemented with DevOpsplan security can be implemented with DevOpsplan security with DevOps in mindprovide an overview of the benefits of having a easy reference checklist or templates prepared when defining RoEprovide an overview of the importance of ethical hacking in today's worldrecall how GDPR protects European Union citizen datarecall how GLBA applies to financial institutionsrecall PCI security requirementsrecognize best practices when testing uncovers exploits or vulnerabilitiesrecognize how HIPAA protects medical informationrecognize how to determine the appropriate scope of engagementrecognize how to respond to and manage incidentsrecognize ISO security standardsrecognize NIST security standardsrecognize the importance of using templates or checklists prior to and during a penetration testrecognize the need for proactive security incident planning
IN THIS COURSE
1.Security Architect33sUP NEXT
EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE
Skillsoft is providing you the opportunity to earn a digital badge upon successful completion of this course, which can be shared on any social network or business platformDigital badges are yours to keep, forever.