YoVDO

CASP+ Cert Prep: 3 Enterprise Security Operations

Offered By: LinkedIn Learning

Tags

CompTIA CASP+ (Plus) Courses Penetration Testing Courses Malware Analysis Courses Information Security Certifications Courses Incident Response Courses Disaster Recovery Courses Vulnerability Assessment Courses Security Assessment Courses Forensic Analysis Courses

Course Description

Overview

Learn the basic of penetration testing and incident response, while studying for domain 3 of the CompTIA Advanced Security Practitioner (CASP+) certification exam.

Syllabus

Introduction
  • Enterprise Security Operations
  • What you should know
  • About the exam
1. Security Assessments
  • What are security assessments?
  • Vulnerability assessments
  • Physical security assessments
  • Malware analysis
  • Penetration testing
  • Penetration testing methods
  • Penetration testing steps: Reconnaissance
  • Penetration testing steps: Fingerprinting
  • Penetration testing steps: Exploitation
  • Penetration testing steps: Pivoting and covering tracks
  • Penetration testing steps: Social engineering
  • Internal vs. external audits
  • Self-assessments: Team exercises
  • Code reviews
2. Tools Used in Security Assessments
  • What kinds of tools do we use for security assessments?
  • Port scanners
  • Vulnerability scanners
  • Protocol analyzers
  • SCAP scanners and tools
  • Network enumerator
  • Password crackers
  • Fuzzer
  • HTTP interceptor
  • Exploitation tools and frameworks
  • Visualization tools
  • Log reduction and analysis tools
  • File integrity monitoring and antivirus
  • Command line tools
  • Physical security tools
  • Reverse engineering tools
3. Incident Response
  • Why are incident response and recovery so important?
  • E-discovery
  • Electronic inventory and asset control
  • Data retention policies
  • Data recovery and storage
  • Data ownership
  • Data handling
  • Legal holds
  • Data breach
  • Incident detection and response
  • Incident and emergency response
  • Chain of custody
  • Forensic analysis
  • Order of volatility
  • Continuity of operations and disaster recovery
  • Severity of the incident
  • Incident response team
  • Post-incident response
4. Tools Used in Incident Response and Recovery
  • Tools used in incident response
  • Disk imaging
  • Network packet capture and analysis
  • nbtstat and netstat
  • Netcat
  • Memory forensics
  • File carving
  • FTK and EnCase
  • Specialized tools for mobile devices
Conclusion
  • Next steps

Taught by

Jason Dion

Related Courses

Advanced Cyber Security Training
EC-Council via FutureLearn
Advanced Python Scripting for Cybersecurity
Infosec via Coursera
Ciberseguridad
Universidad de los Andes via Coursera
Fundamentals of Computer Network Security
University of Colorado System via Coursera
Ethical Hacking Course Certification
Cybrary