Vi ste ovdje
SSCP Domain: Monitoring and Analysis Part 2
Overview/Description
Current business practices demand a certain amount of due diligence with regards to keeping track of system events pertaining to security. This course on security monitoring and analysis provides the learner with an understanding of the requirements and procedures that are components of a secure business environment. The course examines how to determine appropriate methods to protect hosts and networks within a business environment, how to test them for vulnerability and how to determine appropriate methods for carrying out a security penetration test. This course guides you through the Common Body of Knowledge (CBK) recommended by the International Information Systems Security Certification Consortium (ISC)2 for its Systems Security Certified Practitioner (SSCP) certification. The SSCP credential certifies student expertise in 7 different knowledge domains.
Target Audience
Experienced IT professionals with a basic knowledge of network and communications protocols and equipment seeking to pass the System Security Certified Practitioner (SSCP) exam, or otherwise gain knowledge in assessing, planning, implementing and managing IT security in an enterprise environment. A minimum of one year's professional experience in one of the seven SSCP CBK Domains is required for certification.
Expected Duration (hours)
2.0
Lesson Objectivesdescribe features of vulnerability testing software
select appropriate methods for protecting hosts
recognize how to implement advanced firewall testing
identify qualities of Internet perimeter systems
describe traffic types and conditions that a monitoring system in an IDS environment should cover
recognize the implications of war driving for network security
determine appropriate methods to protect hosts and test them for vulnerability
determine appropriate methods to protect networks and test them for vulnerability
identify important considerations for planning a penetration test
describe reconnaissance information gathering techniques
describe common network mapping based information gathering techniques
describe how to exploit systems during a penetration test
describe how to perform a penetration test
determine appropriate methods for carrying out a security penetration test
Current business practices demand a certain amount of due diligence with regards to keeping track of system events pertaining to security. This course on security monitoring and analysis provides the learner with an understanding of the requirements and procedures that are components of a secure business environment. The course examines how to determine appropriate methods to protect hosts and networks within a business environment, how to test them for vulnerability and how to determine appropriate methods for carrying out a security penetration test. This course guides you through the Common Body of Knowledge (CBK) recommended by the International Information Systems Security Certification Consortium (ISC)2 for its Systems Security Certified Practitioner (SSCP) certification. The SSCP credential certifies student expertise in 7 different knowledge domains.
Target Audience
Experienced IT professionals with a basic knowledge of network and communications protocols and equipment seeking to pass the System Security Certified Practitioner (SSCP) exam, or otherwise gain knowledge in assessing, planning, implementing and managing IT security in an enterprise environment. A minimum of one year's professional experience in one of the seven SSCP CBK Domains is required for certification.
Expected Duration (hours)
2.0
Lesson Objectives
SSCP Domain: Monitoring and Analysis Part 2
Trajanje:
2 h
Šifra:
sp_sycp_a05_it_enus