Course description
This course talks about qualitative quantitative risk assessments as well as penetration testing and vulnerability assessments. Next it will discuss network scanning as well as how to monitor networks, protocol analyzers and finally finish up with auditing and logging for the SY0-501 Exam.
Prerequisites
• Basic familiarity with computer networks, administration, and security is helpful (But, all required information will be covered during the course)
• Completion of the CompTIA A+ and Network+ certifications (Helpful, but not required)
Meet the expert
Jason Dion, CISSP No. 349867, is a professor at University of Maryland University College with multiple information technology professional certifications, including Certified Information Systems Security Professional (CISSP), Certified Ethical Hacker (CEH), Certified Network Defense Architect (CNDA), Digital Forensic Examiner (DFE), Digital Media Collector (DMC), CySA+, Security+, Network+, A+, PRINCE2 Practitioner, and ITIL. He holds a Masters of Science degree in Information Technology with a specialization in Information Assurance
Course outline
Risk Assessment and Monitoring
Risk Assessments (28:04)
- Introduction (00:08)
- Risk Assessments (08:34)
- Qualitative Risk (04:06)
- Quantitative Risk (05:28)
- Methodologies (02:49)
- Security Controls (06:49)
- Summary (00:08)
Vulnerability Management (21:00)
- Introduction (00:08)
- Vulnerability Management (07:50)
- Penetration Testing (04:27)
- OVAL (01:34)
- Vulnerability Assessment (06:52)
- Summary (00:08)
Nmap Scanning (27:11)
- Introduction (00:08)
- Nmap Scanning (08:50)
- Demo: Vulnerability Scanning (09:33)
- Password Analysis (05:54)
- Demo: Password Cracking (02:36)
- Summary (00:08)
Monitoring (18:52)
- Introduction (00:08)
- Monitoring Types (02:54)
- Performance Baselining (04:35)
- Protocol Analyzers (02:58)
- SNMP (03:41)
- Demo: Analytical Tools (04:27)
- Summary (00:08)
Auditing (17:53)
- Introduction (00:08)
- Auditing (01:54)
- Demo: Auditing Files (03:53)
- Logging (03:39)
- Log Files (05:14)
- SIEM (02:54)
- Summary (00:08)