Final Exam: Vulnerability Analyst
- 1 Video | 30m 32s
- Includes Assessment
- Earns a Badge
Final Exam: Vulnerability Analyst will test your knowledge and application of the topics presented throughout the Vulnerability Analyst track of the Skillsoft Aspire Security Analyst to Security Architect Journey.
WHAT YOU WILL LEARN
block an attacker after failed login attemptsblock an attacker after too many failed login attemptscompare between public and private keys and their ciphersconfigure a deny-first firewall using ufwconfigure a firewall to block all but a trust subnetconfigure a firewall to block untrusted egressconfigure an NGINX HTTP service to prevent insecure file accessconfigure a secure vpn client to connect to a vpn serverdescribe advantages and disadvantages of various approaches to IPSdescribe a network design approach from a security mindsetdescribe approaches to IPS and how it differs from IDSdescribe approaches to secure coding practicesdescribe authentication threats and non-repudiationdescribe authenticity and identity spoofing threatsdescribe common coding pitfalls that lead to security vulnerabilitiesdescribe effective incident tracking practicesdescribe how incident tracking can be integrated into an organizationdescribe how to validate integrity and tampering threatsdescribe industry standards and the application domains they apply todescribe information threats such as privacy breaches or data leaksdescribe methods and tools that can be used to help secure software through automation and testingdescribe methods of authentication and their best practicesdescribe methods of authorization and access controldescribe methods of brute force attacks and key sizesdescribe methods of keeping login and authentication credentials securedescribe methods used to discover vulnerabilitiesdescribe metrics used to measure the effectiveness of incident trackingdescribe options and deployment strategies for IPSdescribe practical approaches to secure coding practicesdescribe security concerns when adopting new technologies, coding languages, and platforms
describe some of the cyber-security regulations when it comes to tracking and responding to incidentsdescribe the categories of vulnerabilities using the STRIDE modeldescribe the challenges and deficiencies of traditional security architecturesdescribe the challenges of a secure-first network designdescribe the continuous monitoring approach to active incident trackingdescribe the dangers of file upload remote executiondescribe the life cycle of an attack and how it is trackeddescribe the network forensic approach to computer networksdescribe the network security concerns for hybrid cloud modelsdescribe the placement and use of sniffing and IDS sensorsdescribe the principles that define a security architecturedescribe the process and potential security flaws in security architecture implementationdescribe the security benefit of reproducible buildsdescribe the threat of user account discovery and how it is carried outdescribe the tools and techniques used by intrusion detection systemsdescribe the use of encryption methods and best practices in implementing encryptiondescribe the zero-trust modeldescribe the zero-trust model for securitydifferentiate between public and private keys and their ciphershandle security policy trade-offs in situations where solutions might not align with policyidentify how incident tracking can be integrated into an organizationperform a targeted remote scan using Nmapperform IDS with Snortperform IDS with Snort using a sample rulesetperform nmap scans using methods to evade IDS detectionrecognize examples of security misconfiguration threatsuse password security tools to enforce a strong password policyuse the local /etc/hosts to block unwanted connectionsuse tools to scan for potential intrusions on a local systemuse Wireshark to inspect network packets
IN THIS COURSE
1.Vulnerability Analyst33sUP NEXT
EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE
Skillsoft is providing you the opportunity to earn a digital badge upon successful completion of this course, which can be shared on any social network or business platformDigital badges are yours to keep, forever.