Final Exam: Vulnerability Analyst

Intermediate
  • 1 Video | 30m 32s
  • Includes Assessment
  • Earns a Badge
Likes 3 Likes 3
Final Exam: Vulnerability Analyst will test your knowledge and application of the topics presented throughout the Vulnerability Analyst track of the Skillsoft Aspire Security Analyst to Security Architect Journey.

WHAT YOU WILL LEARN

  • block an attacker after failed login attempts
    block an attacker after too many failed login attempts
    compare between public and private keys and their ciphers
    configure a deny-first firewall using ufw
    configure a firewall to block all but a trust subnet
    configure a firewall to block untrusted egress
    configure an NGINX HTTP service to prevent insecure file access
    configure a secure vpn client to connect to a vpn server
    describe advantages and disadvantages of various approaches to IPS
    describe a network design approach from a security mindset
    describe approaches to IPS and how it differs from IDS
    describe approaches to secure coding practices
    describe authentication threats and non-repudiation
    describe authenticity and identity spoofing threats
    describe common coding pitfalls that lead to security vulnerabilities
    describe effective incident tracking practices
    describe how incident tracking can be integrated into an organization
    describe how to validate integrity and tampering threats
    describe industry standards and the application domains they apply to
    describe information threats such as privacy breaches or data leaks
    describe methods and tools that can be used to help secure software through automation and testing
    describe methods of authentication and their best practices
    describe methods of authorization and access control
    describe methods of brute force attacks and key sizes
    describe methods of keeping login and authentication credentials secure
    describe methods used to discover vulnerabilities
    describe metrics used to measure the effectiveness of incident tracking
    describe options and deployment strategies for IPS
    describe practical approaches to secure coding practices
    describe security concerns when adopting new technologies, coding languages, and platforms
  • describe some of the cyber-security regulations when it comes to tracking and responding to incidents
    describe the categories of vulnerabilities using the STRIDE model
    describe the challenges and deficiencies of traditional security architectures
    describe the challenges of a secure-first network design
    describe the continuous monitoring approach to active incident tracking
    describe the dangers of file upload remote execution
    describe the life cycle of an attack and how it is tracked
    describe the network forensic approach to computer networks
    describe the network security concerns for hybrid cloud models
    describe the placement and use of sniffing and IDS sensors
    describe the principles that define a security architecture
    describe the process and potential security flaws in security architecture implementation
    describe the security benefit of reproducible builds
    describe the threat of user account discovery and how it is carried out
    describe the tools and techniques used by intrusion detection systems
    describe the use of encryption methods and best practices in implementing encryption
    describe the zero-trust model
    describe the zero-trust model for security
    differentiate between public and private keys and their ciphers
    handle security policy trade-offs in situations where solutions might not align with policy
    identify how incident tracking can be integrated into an organization
    perform a targeted remote scan using Nmap
    perform IDS with Snort
    perform IDS with Snort using a sample ruleset
    perform nmap scans using methods to evade IDS detection
    recognize examples of security misconfiguration threats
    use password security tools to enforce a strong password policy
    use the local /etc/hosts to block unwanted connections
    use tools to scan for potential intrusions on a local system
    use Wireshark to inspect network packets

IN THIS COURSE

  • Playable
    1. 
    Vulnerability Analyst
    33s
    UP NEXT

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion of this course, which can be shared on any social network or business platform

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE

Likes 6 Likes 6  
Likes 3 Likes 3  
Likes 0 Likes 0