SecOps Proficiency (Advanced Level)

  • 31m 58s
  • 32 questions
The SecOps Proficiency benchmark measures whether a learner has an advanced understanding of the SecOps practice, with additional experience with SecOps tools and processes. A learner who scores high on this benchmark demonstrates professional proficiency in all of the major areas of the SecOps discipline, across a variety of different platforms and deployments. This learner works and acts almost 100% independently of others, and is seen as a leader in the industry.

Topics covered

  • apply risk management standards according to NIST 800-37
  • assess security vulnerabilities using CVSS
  • calculate risk levels in a quantitative manner
  • compare vulnerability to penetration testing and describe the function of each
  • describe and use DREAD, PASTA, and other risk models
  • describe black box penetration testing and why it may be used
  • describe cryptography and its four goals
  • describe grey box penetration testing and why it may be used
  • describe how indicators of compromise can help reduce exploits in an environment
  • describe how to find a vulnerability using scanners and other techniques
  • describe organizational risk tolerance and why it is important
  • describe policies and procedures for keeping systems secure in preemptive troubleshooting
  • describe preemptive troubleshooting and how it applies to security and SecOps
  • describe the COBIT 5 standard
  • describe the common types of penetration and the importance of testing each type
  • describe the different categories of findings
  • describe the importance of setting stopping points and when to stop a penetration test
  • describe the rules of engagement and how they are used
  • describe what should be documented during a penetration test and why it is important
  • describe white box penetration testing and why it may be used
  • differentiate between malware types and recognize some of the consequences of using targeted malware
  • differentiate between scanning and enumeration
  • differentiate between symmetric and asymmetric cryptography
  • evaluate security in accordance with ISO/IEC 18045
  • identify and implement specific responses to risk
  • recognize how preemptive troubleshooting is different than intrusion detection systems
  • recognize how to choose a password cracking technique
  • update hardware and recognize the importance of doing so
  • update software and recognize the importance of doing so
  • use password policies to enforce compliance
  • use tools to troubleshoot hardware and policies to prevent security compromise
  • utilize the CIA triangle and the McCumber cube to assess risks and threats