SSCP Domain: Monitoring and Analysis Part 2

This course is included in our On-demand training solution.

Overview

Current business practices demand a certain amount of due diligence with regards to keeping track of system events pertaining to security. This course on security monitoring and analysis provides the learner with an understanding of the requirements and procedures that are components of a secure business environment. The course examines how to determine appropriate methods to protect hosts and networks within a business environment, how to test them for vulnerability and how to determine appropriate methods for carrying out a security penetration test. This course guides you through the Common Body of Knowledge (CBK) recommended by the International Information Systems Security Certification Consortium (ISC)2 for its Systems Security Certified Practitioner (SSCP) certification. The SSCP credential certifies student expertise in 7 different knowledge domains.

Target Audience

Experienced IT professionals with a basic knowledge of network and communications protocols and equipment seeking to pass the System Security Certified Practitioner (SSCP) exam, or otherwise gain knowledge in assessing, planning, implementing and managing IT security in an enterprise environment. A minimum of one year’s professional experience in one of the seven SSCP CBK Domains is required for certification.

Prerequisites

Expected Duration

120 min.

Course Objectives

Testing Hosts for Vulnerability

  • describe features of vulnerability testing software
  • select appropriate methods for protecting hosts
  • Testing Networks for Vulnerability

  • recognize how to implement advanced firewall testing
  • identify qualities of Internet perimeter systems
  • Security Monitoring and Wireless Network Testing

  • describe traffic types and conditions that a monitoring system in an IDS environment should cover
  • recognize the implications of war driving for network security
  • Testing Hosts and Networks

    Preparing for Penetration Testing

  • identify important considerations for planning a penetration test
  • Gathering Information

  • describe reconnaissance information gathering techniques
  • describe common network mapping based information gathering techniques
  • Risk Analysis, Active Attempts and Result Analysis

  • describe how to exploit systems during a penetration test
  • describe how to perform a penetration test
  • Penetration Testing

    SUBSCRIPTION COST



     

    NEED HELP OR NOT SURE?