Internet And Network Technologies
Cybersecurity 101
Cybersecurity 101: Auditing & Incident Response
Cybersecurity 101: Session & Risk Management
Final Exam: Security Analyst

Cybersecurity 101: Auditing & Incident Response

Course Number:
it_spcs101dj_02_enus
Lesson Objectives

Cybersecurity 101: Auditing & Incident Response

  • Course Overview
  • list best practices related to IT security auditing
  • use Group Policy to enable file system auditing
  • scan hosts for security weaknesses from Windows
  • scan hosts for security weaknesses from Linux
  • describe the importance of securing mobile devices
  • centrally apply security settings to mobile devices
  • configure Amazon Web Services to use multifactor authentication
  • recognize how security is applied to applications from design to use
  • use file hashing to detect modifications
  • specify actions used when dealing with security incidents
  • view a packet capture to identify suspicious activity
  • centrally apply security settings

Overview/Description

Explore selective auditing, which provides valuable insights to activity on a network, and also Incident response plans, which are proactive measures used to deal with negative events.



Target

Prerequisites: none

Cybersecurity 101: Session & Risk Management

Course Number:
it_spcs101dj_01_enus
Lesson Objectives

Cybersecurity 101: Session & Risk Management

  • Course Overview
  • recognize digital assets that have value to the organization along with related threats
  • identify and prioritize risks
  • implement security controls to mitigate risk
  • describe account management actions that secure the environment
  • use Group Policy to implement user account hardening
  • recognize how HTTP session management can affect security
  • harden web browsers and servers to use TLS
  • explain how centralized mobile device control can secure the environment
  • recognize encryption techniques use to protect data
  • configure a VPN to protect data in motion
  • configure file encryption to protect data at rest
  • configure encryption and session management settings

Overview/Description

A structured approach to security allows for the efficient management of security controls. Explore assets, threats, and vulnerabilities, risk management, user and session management, data confidentiality, and encryption.



Target

Prerequisites: none

Final Exam: Security Analyst

Course Number:
it_fesasa_01_enus
Lesson Objectives

Final Exam: Security Analyst

  • classify the various types of honeypots that can be used
  • classify the various types of security protocols
  • compare governance and management
  • compare pen testing and vulnerability assessments
  • compare the types of risk responses that an organization may adapt
  • compare the various types of honeypots that can be used
  • compare VMs and containers
  • compare VMs and containers characteristics
  • configure a VPN to protect data
  • configure a VPN to protect data in motion
  • configure file encryption to protect data at rest
  • define an Advanced Persistent Threat and its purpose
  • define continuous security monitoring and list its benefits
  • define the risk assessment processes that can help you protect your assets
  • define the secure DevOps lifecycle
  • describe best practices for working with and handling corporate information while traveling
  • describe honeypot uses
  • describe how employee training, awareness, and advocacy should be implemented and how it plays a crucial role in the protection of an organization's information
  • describes the benefits of Continuous Security
  • describe subnetting and its advantages
  • describe the characteristics of APTs as well as their goals and objectives
  • describe the elements used in designing goals of a security topology
  • describe the importance of securing mobile devices
  • describe the motives behind an APT and the probable targets
  • describe the process of rolling out a security governance program
  • describe the role physical security plays in the protection of corporate data
  • describe the target selection for pen testing
  • describe the various types of DNS attacks and their mitigations
  • describe types of security topologies
  • discover the key concepts covered in this course
  • discuss network demilitarized zones and how they help protect corporate information
  • discuss the problems presented by organizational and personal e-mail, and best practices for working with e-mail, including how to protect yourself from spam
  • distinguish between governance and management
  • distinguish between pen testing and vulnerability assessments
  • identify the key point for creating an effective checklist for NAC Security
  • identify the phases of the secure DevOps lifecycle
  • identify the risks introduced by BYOD and IoT along with their preventive measures
  • identify the security risks introduced by BYOD and IoT
  • identify the security risks introduced by BYOD and IoT along with their preventive measures
  • identify the threat actors
  • identify the types of weak protocols and their replacements
  • identify the various roles and responsibilities of senior management in governance
  • identify the various types of security protocols
  • identify the various types of tools used in pen testing
  • list best practices related to IT security auditing
  • list the NAC authentication methods
  • list the steps of the APT lifecycle
  • list the threats, vulnerabilities, and mitigation techniques in a network security
  • recognize how HTTP session management can affect security
  • recognize the deployment strategies of a honeypot
  • scan hosts for security weaknesses from Linux
  • specify how honeypots are placed in a network
  • specify how social engineering is conducted and how it can be mitigated through corporate policy
  • specify the importance of implementing organizational security programs and why companies that don't have them put themselves at risk
  • specify the proper ways to handle sensitive company information, including the differences between working with online data and physical media
  • specify the top kinds of security threats facing organizations today
  • specify what network hardening is and how it relates to the protection of corporate information
  • use Group Policy to enable file system auditing
  • use Group Policy to implement user account hardening
  • view a packet capture to identify suspicious activity

Overview/Description

Final Exam: Security Analyst will test your knowledge and application of the topics presented throughout the Security Analyst track of the Skillsoft Aspire Security Analyst to Security Architect Journey.



Target

Prerequisites: none

Close Chat Live