System Security Certified Practitioner (SSCP 2018): Security Assessments

Intermediate
  • 15 videos | 1h 1m 31s
  • Includes Assessment
  • Earns a Badge
Rating 4.2 of 26 users Rating 4.2 of 26 users (26)
This 15-video course prepares learners for the Systems Security Certified Practitioner (SSCP) certification exam by exploring security assessments, vulnerability scans, and penetration testing. First, you will examine the Nmap (network mapper) scanner to probe computer networks for host discovery, service, and operating system detection. You will learn how to use Nmap to conduct a network scan by using Windows. This course examines vulnerability scanning, and it demonstrates how to do penetration testing to identify and exploit host and network weaknesses. Learners will examine the importance of monitoring and analysis to identify security incidents. You will learn how to use a Windows performance monitor, and how to monitor resource usage in Linux. Continue by examining LANguard and end map assessments. This course then demonstrates how to view system logs to troubleshoot problems, and how to enhance the security of a network. You will learn how to configure log filtering in a Windows environment. Finally, learners will explore SCADA (Supervisory Control and Data Acquisition), and SIEM (for Security Information and Event Management).

WHAT YOU WILL LEARN

  • Describe security assessment considerations
    Explain the purpose of a vulnerability assessment
    Run a network scan using nmap in windows
    Run a network scan using nmap in linux
    Explain the purpose of a penetration test
    Describe how monitoring can enhance security
    Add metrics to a performance monitor chart
  • Use commands such as top to monitor performance in linux
    Describe how logging relates to security
    Filter log events in the windows event viewer
    Enable rsyslog forwarding between linux hosts
    Explain scada and ics
    Define how siem allows for the timely analysis of security events
    Monitor system performance to identify abnormal activity

IN THIS COURSE

  • 2m 3s
  • 4m 25s
    After completing this video, you will be able to describe security assessment considerations. FREE ACCESS
  • Locked
    3.  Vulnerability Assessments
    5m 13s
    After completing this video, you will be able to explain the purpose of a vulnerability assessment. FREE ACCESS
  • Locked
    4.  Conduct a Network Scan Using Windows
    4m 19s
    In this video, you will run a network scan using Nmap on Windows. FREE ACCESS
  • Locked
    5.  Conduct a Network Scan Using Linux
    4m 54s
    In this video, you will learn how to run a network scan using Nmap in Linux. FREE ACCESS
  • Locked
    6.  Penetration Testing
    3m 33s
    After completing this video, you will be able to explain the purpose of a penetration test. FREE ACCESS
  • Locked
    7.  Monitoring and Analysis Overview
    3m 10s
    After completing this video, you will be able to describe how monitoring can enhance security. FREE ACCESS
  • Locked
    8.  Using Windows Performance Monitor
    6m 12s
    In this video, you will learn how to add metrics to a performance monitor chart. FREE ACCESS
  • Locked
    9.  Monitoring Resource Usage in Linux
    7m 45s
    In this video, find out how to use commands such as "top" to monitor performance in Linux. FREE ACCESS
  • Locked
    10.  Logging
    4m 28s
    Upon completion of this video, you will be able to describe how logging relates to security. FREE ACCESS
  • Locked
    11.  Windows Log Filtering
    5m 30s
    In this video, you will learn how to filter log events in the Windows Event Viewer. FREE ACCESS
  • Locked
    12.  Linux Log Forwarding
    2m 28s
    Find out how to enable rsyslog forwarding between Linux and Windows hosts. FREE ACCESS
  • Locked
    13.  SCADA and ICS
    3m 9s
    After completing this video, you will be able to explain SCADA and ICS. FREE ACCESS
  • Locked
    14.  SIEM
    2m 16s
    In this video, you will learn how SIEM allows for the timely analysis of security events. FREE ACCESS
  • Locked
    15.  Exercise: Configure and Use Monitoring Solutions
    2m 6s
    In this video, you will monitor system performance to identify abnormal activity. FREE ACCESS

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE

Rating 4.6 of 5 users Rating 4.6 of 5 users (5)
Rating 5.0 of 1 users Rating 5.0 of 1 users (1)
Rating 5.0 of 1 users Rating 5.0 of 1 users (1)

PEOPLE WHO VIEWED THIS ALSO VIEWED THESE

Rating 4.5 of 59 users Rating 4.5 of 59 users (59)
Rating 4.2 of 164 users Rating 4.2 of 164 users (164)