Final Exam: Vulnerability Analyst
- 1 Video | 32s
- Includes Assessment
- Earns a Badge
Final Exam: Vulnerability Analyst will test your knowledge and application of the topics presented throughout the Vulnerability Analyst track of the Skillsoft Aspire Security Analyst to Security Architect Journey.
WHAT YOU WILL LEARN
perform a targeted remote scan using Nmapdescribe the dangers of file upload remote executiondescribe the zero-trust model for securitydescribe the network security concerns for hybrid cloud modelsdescribe the principles that define a security architecturedescribe the challenges and deficiencies of traditional security architecturesdescribe the placement and use of sniffing and IDS sensorsdescribe the use of encryption methods and best practices in implementing encryptionconfigure a firewall to block untrusted egressconfigure a firewall to block all but a trust subnetdescribe information threats such as privacy breaches or data leaksdescribe approaches to secure coding practicesdescribe industry standards and the application domains they apply toblock an attacker after too many failed login attemptsperform IDS with Snortdescribe metrics used to measure the effectiveness of incident trackingdescribe approaches to IPS and how it differs from IDSdescribe authentication threats and non-repudiationperform IDS with Snort using a sample rulesetdescribe methods of authentication and their best practicesrecognize examples of security misconfiguration threatsconfigure an NGINX HTTP service to prevent insecure file accessdescribe how incident tracking can be integrated into an organizationdescribe options and deployment strategies for IPSdescribe the life cycle of an attack and how it is trackeddescribe the process and potential security flaws in security architecture implementationdescribe the continuous monitoring approach to active incident trackingdescribe the challenges of a secure-first network designdescribe the tools and techniques used by intrusion detection systemsdescribe the network forensic approach to computer networks
perform nmap scans using methods to evade IDS detectiondescribe a network design approach from a security mindsetdescribe the threat of user account discovery and how it is carried outdescribe methods and tools that can be used to help secure software through automation and testingdescribe methods of authorization and access controlconfigure a secure vpn client to connect to a vpn serverdifferentiate between public and private keys and their ciphersdescribe authenticity and identity spoofing threatsdescribe how to validate integrity and tampering threatsdescribe practical approaches to secure coding practicesdescribe common coding pitfalls that lead to security vulnerabilitiesdescribe the security benefit of reproducible buildsuse Wireshark to inspect network packetsdescribe methods used to discover vulnerabilitiesdescribe methods of brute force attacks and key sizesdescribe the zero-trust modelblock an attacker after failed login attemptsuse password security tools to enforce a strong password policycompare between public and private keys and their ciphersdescribe the categories of vulnerabilities using the STRIDE modelidentify how incident tracking can be integrated into an organizationdescribe methods of keeping login and authentication credentials secureconfigure a deny-first firewall using ufwuse tools to scan for potential intrusions on a local systemdescribe security concerns when adopting new technologies, coding languages, and platformsdescribe advantages and disadvantages of various approaches to IPShandle security policy trade-offs in situations where solutions might not align with policyuse the local /etc/hosts to block unwanted connectionsdescribe effective incident tracking practicesdescribe some of the cyber-security regulations when it comes to tracking and responding to incidents
IN THIS COURSE
1.Vulnerability Analyst33sUP NEXT
EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE
Skillsoft is providing you the opportunity to earn a digital badge upon successful completion of this course, which can be shared on any social network or business platformDigital badges are yours to keep, forever.
YOU MIGHT ALSO LIKE