SSCP 2021: Security & Vulnerability Assessment

SSCP 2021    |    Intermediate
  • 8 Videos | 30m 20s
  • Includes Assessment
  • Earns a Badge
Once you've assessed an organization's risks, you need to implement continuous visibility and reporting to understand risk evolution. Furthermore, once you've established security policies and controls, you need to test and evaluate them to confirm their efficacy. To meet these goals, security practitioners need to know how to uncover vulnerabilities, identify events of interest, monitor logs, and analyze metrics. Use this course to learn security and vulnerability assessment techniques and methodologies. Explore security testing, risk review, and vulnerability management. Examine data logging and event aggregation. Learn how to implement monitoring and event data analysis. And see how to document and communicate findings. Upon completion, you'll be able to identify, monitor, and analyze security risks. You'll also be further prepared to sit the (ISC)² Systems Security Certified Practitioner (SSCP) 2021 exam.

WHAT YOU WILL LEARN

  • discover the key concepts covered in this course
    describe several security testing techniques and the activities they involve
    recognize how risk review should be conducted and describe the processes involved in two risk review models
    define each stage of the vulnerability management life cycle, outline how penetration testing works, and identify various penetration testing frameworks and common web vulnerabilities
  • describe monitoring source systems and events
    distinguish between SIEM and SOAR systems
    outline how to analyze monitoring results and generate reports
    summarize the key concepts covered in this course

IN THIS COURSE

  • Playable
    1. 
    Course Overview
    1m 46s
    UP NEXT
  • Playable
    2. 
    Security Testing Methods and Activities
    5m
  • Locked
    3. 
    Risk Review Best Practices and Models
    3m 55s
  • Locked
    4. 
    The Vulnerability Management Life Cycle
    8m 31s
  • Locked
    5. 
    Monitoring Source Systems and Events
    2m 12s
  • Locked
    6. 
    SIEM and SOAR Systems
    4m 37s
  • Locked
    7. 
    Analysis of Monitoring Results
    3m 35s
  • Locked
    8. 
    Course Summary
    44s

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion of this course, which can be shared on any social network or business platform

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE