SecOps Tool Landscape: Intro to Security Tools (SecTools)

Kali Linux 2022.2    |    Intermediate
  • 13 Videos | 1h 31m 59s
  • Includes Assessment
  • Earns a Badge
Organizations spend money on security controls to protect company assets, but how do they know those assets are protected from hackers? One way is to use the same tools that hackers use and perform security test known as penetration testing or ethical hacking. In this course, explore the purpose of security tools, including their history and the response to modern attacks. Take a look at open-source intelligence tools used to collect information from online sources. Next, investigate the purpose and importance of ethical hacking. Finally, examine the value of building a security toolbox, the different categories of tools, and how to obtain appropriate security tools.

WHAT YOU WILL LEARN

  • discover the key concepts covered in this course
    describe security tools in context, including the history of security tools and the response to modern attacks
    categorize security tools
    identify common tools used for information gathering
    use password cracking tools
    build a SecTools toolbox
    describe ethical hacking
  • describe why ethical hacking is an important activity
    use Nessus to perform a vulnerability scan
    identify and use appropriate tools to exploit a system on the network
    create a SecTools environment
    choose the correct security tools for specific jobs
    summarize the key concepts covered in this course

IN THIS COURSE

  • Playable
    1. 
    Course Overview
    54s
    UP NEXT
  • Playable
    2. 
    Security Tools (SecTools)
    5m 1s
  • Locked
    3. 
    Categories of Security Tools
    8m 34s
  • Locked
    4. 
    Using Open-source Intelligence (OSINT) Tools
    19m 51s
  • Locked
    5. 
    Using a Password Cracker
    14m
  • Locked
    6. 
    Security Tools Toolbox
    3m 36s
  • Locked
    7. 
    Ethical Hacking
    2m 9s
  • Locked
    8. 
    The Importance of Ethical Hacking
    2m 44s
  • Locked
    9. 
    Performing a Vulnerability Scan
    17m 36s
  • Locked
    10. 
    Using an Exploitation Tool
    11m 13s
  • Locked
    11. 
    The SecTools Environment
    2m 17s
  • Locked
    12. 
    How to Choose the Correct Security Tools
    3m 13s
  • Locked
    13. 
    Course Summary
    50s

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion of this course, which can be shared on any social network or business platform

Digital badges are yours to keep, forever.