Internet And Network Technologies
Getting Started with Information Security
Final Exam: Security Analyst
Information Security: APT Defenses
Information Security: Continual Infrastructure Testing
Information Security: Hardened Security Topologies
Information Security: Honeypots
Information Security: NACs & Gateways
Information Security: Pen Testing
Information Security: Securing Networking Protocols
Information Security: Security Governance
Information Security: Subnetting & DNS for Security Architects

Final Exam: Security Analyst

Course Number:
dj_sasa1_a01_fe_enus
Objectives:

Overview/Description
Final Exam: Security Analyst will test your knowledge and application of the topics presented throughout the Security Analyst track of the Skillsoft Aspire Security Analyst to Security Architect Journey.

Target Audience
Learners seeking to test their knowledge and application of Security Analyst skills and those seeking to complete the Security Analyst track of the Skillsoft Aspire Security Analyst to Security Architect Journey.

Prerequisites: none

Information Security: APT Defenses

Course Number:
it_saseandj_01_enus
Lesson Objectives

Information Security: APT Defenses

  • introduce the key concepts of the course
  • define an Advanced Persistent Threat and its purpose
  • list the steps of the APT lifecycle
  • describe the motives behind an APT and the probable targets
  • identify APT defense best practices
  • identify the methods that can be used to make the APT defenses stronger
  • recall the method(s) to deal with Advanced Persistent Threats
  • describe the Equation AKA APT group and its involvement in various cyber crimes
  • list the tools that are used when conducting an APT
  • define risks and recall methods used to response, reduce, avoid, accept, and transfer risks
  • define the risk assessment processes that can help you protect your assets
  • identify the key points for creating an effective checklist to address APT attacks
  • summarize the key concepts covered in this course

Overview/Description

Discover key Advanced Persistent Threat concepts such as defenses and best practices. Explore the common APT attacks and mitigation techniques that can be used, APT tools, and how to create effective APT checklists.



Target

Prerequisites: none

Information Security: Continual Infrastructure Testing

Course Number:
it_saseandj_06_enus
Lesson Objectives

Information Security: Continual Infrastructure Testing

  • introduce the key concepts of the course
  • define continuous security practices
  • identify the need for continuous security in a DevOps environment
  • describe the importance of continuous security
  • list the benefits of using DevOps
  • define continuous security monitoring and list its benefits
  • identify the best practices of DevOps security
  • define the secure DevOps lifecycle
  • identify the security risks of DevOps
  • list the various tools used for DevOps testing
  • summarize the key concepts covered in this course

Overview/Description

Discover key DevOps concepts such as continuous security and security monitoring, benefits of using DevOps and best practices of DevOps security. Explore the secure DevOps lifecycle and learn about security risks and the various tools used for DevOps testing.



Target

Prerequisites: none

Information Security: Hardened Security Topologies

Course Number:
it_saseandj_05_enus
Lesson Objectives

Information Security: Hardened Security Topologies

  • introduce the key concepts of the course
  • define security topologies
  • describe the elements used in designing goals of a security topology
  • list the advantages and disadvantages of different security topologies
  • describe the impact of integrating cloud topologies
  • list the various layers of security in cloud computing
  • name the different methods used to harden security topologies
  • summarize the key concepts covered in this course

Overview/Description

Discover the key concepts of different security topologies. Explore their advantages and disadvantages, techniques, integration with cloud, and layers of cloud security.



Target

Prerequisites: none

Information Security: Honeypots

Course Number:
it_saseandj_08_enus
Lesson Objectives

Information Security: Honeypots

  • introduce the key concepts of the course
  • describe a honeypot
  • classify the various types of honeypots that can be used
  • describe the role played by honeypots in overall network security
  • list honeypot disadvantages
  • describe honeypot uses
  • recognize the deployment strategies of a honeypot
  • list the various open-source and commercial honeypot products available in the market
  • specify how honeypots are placed in a network
  • install and configure a honeypot using KFSensor honeypot software
  • describe how honeypot data analysis is conducted
  • summarize the key concepts covered in this course

Overview/Description

Explore various honeypot concepts, such as the types of honeypots, roles and uses of a honeypot, and how honeypot data analysis is used. Examine the strengths and weaknesses of a honeypot and how its placed in networks.



Target

Prerequisites: none

Information Security: NACs & Gateways

Course Number:
it_saseandj_02_enus
Lesson Objectives

Information Security: NACs & Gateways

  • introduce the key concepts of the course
  • identify the security risks introduced by BYOD and IoT along with their preventive measures
  • list the major challenges with BYOD in an organization
  • define NAC and the importance it has in a network
  • illustrate the NAC architecture
  • list the different features of NAC
  • describe the impact of an improperly configured NAC
  • list various NAC elements
  • recall the best practices of implementing NAC
  • identify the key point for creating an effective checklist for NAC Security
  • list the NAC authentication methods
  • summarize the key concepts covered in this course

Overview/Description

Discover the key NAC concepts such as NAC features, the importance of NAC in a network, various NAC elements, authentication, and its implementation. Explore the risks and challenges associated with BYOD and IoT.



Target

Prerequisites: none

Information Security: Pen Testing

Course Number:
it_saseandj_09_enus
Lesson Objectives

Information Security: Pen Testing

  • introduce the key concepts of the course
  • list the steps performed during the pen testing process
  • specify the reasons an organization needs to perform pen testing
  • distinguish between pen testing and vulnerability assessments
  • compare different types of pen testing
  • list the weaknesses of pen testing
  • identify the various types of tools used in pen testing
  • describe the target selection for pen testing
  • identify the threat actors
  • describe the types of assets in an organization
  • compare the types of risk responses that an organization may adapt
  • use the Metasploit framework in Kali Linux
  • create an exploit using MSFvenom
  • summarize the key concepts covered in this course

Overview/Description

Explorer the key pen testing concepts such as vulnerability assessment, types of pen testing, and threat actors. Discover why pen testing is needed and the tools used for pen testing.



Target

Prerequisites: none

Information Security: Securing Networking Protocols

Course Number:
it_saseandj_04_enus
Lesson Objectives

Information Security: Securing Networking Protocols

  • introduce the key concepts of the course
  • list the common protocols used in a network
  • identify some of the security issues of the TCP/IP model at the layer level
  • list the threats, vulnerabilities, and mitigation techniques in a network security
  • identify the types of weak protocols and their replacements
  • classify the various types of security protocols
  • identify the ways to use security protocols in different situations
  • describe the importance of implementing security protocols
  • describe the security-first mindset and its necessity
  • summarize the key concepts covered in this course

Overview/Description

Explore the key concepts of common protocols in use, and discover the security issues of TCP/IP model and security protocols.



Target

Prerequisites: none

Information Security: Security Governance

Course Number:
it_saseandj_07_enus
Lesson Objectives

Information Security: Security Governance

  • introduce the key concepts of the course
  • distinguish between governance and management
  • describe the different types of IT governance frameworks
  • identify the various roles and responsibilities of senior management in governance
  • list the measures used to ensure good IT security governance
  • identify the risks and opportunities in security governance
  • describe the process of rolling out a security governance program
  • describe the structure of a governance framework
  • summarize the key concepts covered in this course

Overview/Description

Discover the importance of implementing security governance in an organization. Explore the differences between governance and management, types of governance frameworks, and the roles of senior management. Ensuring good IT security governance, risks and opportunities, security governance programs, and governance framework structure is also covered.



Target

Prerequisites: none

Information Security: Subnetting & DNS for Security Architects

Course Number:
it_saseandj_03_enus
Lesson Objectives

Information Security: Subnetting & DNS for Security Architects

  • introduce the key concepts of the course
  • describe subnetting and its advantages
  • define the CIDR notation
  • recognize subnetting tips and tricks
  • compare VMs and containers
  • describe the deployment considerations for virtual machines and containers
  • recognize best practices for deploying virtual machines
  • recognize best practices for VM and container security
  • describe the various types of DNS attacks and their mitigations
  • recognize the various types of subnetting attacks and mitigations
  • summarize the key concepts covered in this course

Overview/Description

Discover key concepts related to subnetting, VM, Container, and DNS security. Examine tips and tricks used in subnetting and subnetting advantages. Explore CIDR notation, deployment and security considerations for VMs and containers, and types of DNS attacks and mitigation strategies.



Target

Prerequisites: none

Close Chat Live