Final Exam: Security Threat Intelligence
1 Video | 30m 32s
- Includes Assessment
- Earns a Badge
Final Exam: Security Threat Intelligence will test your knowledge and application of the topics presented throughout the Security Threat Intelligence track of the Skillsoft Aspire Security Threat Intelligence Journey.
WHAT YOU WILL LEARN
apply DNS filters and examine DNS queries in Wiresharkcapture and examine HTTP traffic using Wiresharkchange file and folder permissions from a Bash scriptcompare and use conditionals in C and C++connect to a remote server securely using sshcreate custom functions in a Python scriptcreate loops in PowerShellcreate, modify, and delete user accounts in a Linux systemdefine what is involved in risk analysis and risk modeling as they relate to threat intelligence and outline the FAIR risk model and frameworkdemonstrate how to create a password policy on a Windows workstation to prevent dictionary attacksdemonstrate how to implement an account lockout policy to stop brute force attacksdemonstrate how to implement full disk encryption with BitLockerdemonstrate techniques to harden Windows DNS Serversdemonstrate the use of packet capturing to gain intelligence from an attackdescribe and compare the different types of DCO missionsdescribe common security vulnerabilities in code that can lead to exploitsdescribe how machine learning can improve threat intelligencedescribe how SIEMs are used to detect threat activitydescribe how to gather digital evidence, including identification, collection, acquisition, and preservationdescribe malware cyber threats and how reverse engineering malware can lead to attributiondescribe symptoms of an infected systemdescribe the command processing capabilities and environment of the Bash shelldescribe the common features and properties of command line environmentsdescribe the function and characteristics of the NetFlow and IPFIX network flow protocolsdescribe the Open Systems Interconnection (OSI) model for network communicationsdescribe the operations of DCO in terms of missions, actions, and forcesdescribe when and how to use threat intelligence, including before, during, and after an attackdifferentiation between attribution types such as machine, human, adversarydiscuss common BIOS/UEFI settings that are used to help secure the systemdiscuss common techniques to secure the file system
identify bash scripts based on their featuresidentify different types of malware attacksidentify different types of PowerShell cmdlets and objectsidentify key steps when responding to malware incidentsidentify network endpoints from captured network traffic using Wiresharkidentify the phases of the Cyber Operations Cycleidentify the roles and responsibilities of OCO team members and how they interact within the cyber operations cycleimplement the for and while loops in a Python scriptinspect the static properties of malwareinstall ELK stack in preparation for it to serve as a SIEM for Suricatanavigate ELK Stack's Kibana dashboards for SIEM use when connected to Suricataoutline how to gather digital evidence, including identification, collection, acquisition, and preservationoutline the Open Systems Interconnection (OSI) model for network communicationsperform ARP scans to find hidden hosts on a networkperform DNS host discoveryperform requests with netcat and other tools to pull banner information from servicesprovide an overview of malware cyber threats and how reverse engineering malware can lead to attributionrecognize best practices for removing malwarerecognize common malware characteristics at the Windows API level (registry manipulation, keylogging, HTTP communications, droppers)recognize different tools used for network scanningrecognize the importance of audit logs for securityrecognize the importance of identifying and preserving forensic artifacts and list common errors when dealing with digital evidencerecognize the use of various baselines for network managementrecognize why intrusion detection is the heart of threat intelligence and outline the kill chain and diamond models of analysisset variables in a Bash scriptuse and set variables in a Bash scriptuse loops in C and C++use the for and while loops in a Python scriptuse the for, while, and until loops in a Bash scriptuse the for, while, and until loops in a Bash script
IN THIS COURSE
1.Security Threat Intelligence33sUP NEXT
EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE
Skillsoft is providing you the opportunity to earn a digital badge upon successful completion of this course, which can be shared on any social network or business platformDigital badges are yours to keep, forever.
YOU MIGHT ALSO LIKE