Final Exam: Security Threat Intelligence
- 1 Video | 32s
- Includes Assessment
- Earns a Badge
Final Exam: Security Threat Intelligence will test your knowledge and application of the topics presented throughout the Security Threat Intelligence track of the Skillsoft Aspire Security Threat Intelligence Journey.
WHAT YOU WILL LEARN
use the for, while, and until loops in a Bash scriptuse the for and while loops in a Python scriptrecognize the importance of identifying and preserving forensic artifacts and list common errors when dealing with digital evidencedescribe common security vulnerabilities in code that can lead to exploitsidentify the phases of the Cyber Operations Cycleidentify the roles and responsibilities of OCO team members and how they interact within the cyber operations cycleidentify bash scripts based on their featuresdescribe the common features and properties of command line environmentscreate, modify, and delete user accounts in a Linux systemset variables in a Bash scriptdescribe the command processing capabilities and environment of the Bash shellconnect to a remote server securely using sshcreate custom functions in a Python scriptcompare and use conditionals in C and C++use loops in C and C++implement the for and while loops in a Python scriptidentify different types of malware attacksuse and set variables in a Bash scriptuse the for, while, and until loops in a Bash scriptidentify different types of PowerShell cmdlets and objectschange file and folder permissions from a Bash scriptcreate loops in PowerShelldescribe how SIEMs are used to detect threat activitydescribe symptoms of an infected systemidentify key steps when responding to malware incidentsrecognize different tools used for network scanningdiscuss common techniques to secure the file systemdemonstrate the use of packet capturing to gain intelligence from an attackdemonstrate techniques to harden Windows DNS Serversinstall ELK stack in preparation for it to serve as a SIEM for Suricata
perform DNS host discoverydescribe the Open Systems Interconnection (OSI) model for network communicationsrecognize the use of various baselines for network managementinspect the static properties of malwarenavigate ELK Stack's Kibana dashboards for SIEM use when connected to Suricataoutline how to gather digital evidence, including identification, collection, acquisition, and preservationdifferentiation between attribution types such as machine, human, adversaryrecognize why intrusion detection is the heart of threat intelligence and outline the kill chain and diamond models of analysisdescribe malware cyber threats and how reverse engineering malware can lead to attributiondefine what is involved in risk analysis and risk modeling as they relate to threat intelligence and outline the FAIR risk model and frameworkdescribe when and how to use threat intelligence, including before, during, and after an attackdescribe how machine learning can improve threat intelligenceprovide an overview of malware cyber threats and how reverse engineering malware can lead to attributiondescribe and compare the different types of DCO missionsdiscuss common BIOS/UEFI settings that are used to help secure the systemdemonstrate how to create a password policy on a Windows workstation to prevent dictionary attacksrecognize common malware characteristics at the Windows API level (registry manipulation, keylogging, HTTP communications, droppers)describe how to gather digital evidence, including identification, collection, acquisition, and preservationcapture and examine HTTP traffic using Wiresharkdemonstrate how to implement an account lockout policy to stop brute force attacksrecognize best practices for removing malwaredescribe the function and characteristics of the NetFlow and IPFIX network flow protocolsperform requests with netcat and other tools to pull banner information from servicesdemonstrate how to implement full disk encryption with BitLockerdescribe the operations of DCO in terms of missions, actions, and forcesperform ARP scans to find hidden hosts on a networkoutline the Open Systems Interconnection (OSI) model for network communicationsapply DNS filters and examine DNS queries in Wiresharkidentify network endpoints from captured network traffic using Wiresharkrecognize the importance of audit logs for security
IN THIS COURSE
1.Security Threat Intelligence33sUP NEXT
EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE
Skillsoft is providing you the opportunity to earn a digital badge upon successful completion of this course, which can be shared on any social network or business platformDigital badges are yours to keep, forever.
YOU MIGHT ALSO LIKE