CASP+ Cert Prep: 3 Enterprise Security Operations

Go to class
Write Review

Free Online Course: CASP+ Cert Prep: 3 Enterprise Security Operations provided by LinkedIn Learning is a comprehensive online course, which lasts for 1-2 hours worth of material. The course is taught in English and is free of charge. Upon completion of the course, you can receive an e-certificate from LinkedIn Learning. CASP+ Cert Prep: 3 Enterprise Security Operations is taught by Jason Dion.

Overview
  • Learn the basic of penetration testing and incident response, while studying for domain 3 of the CompTIA Advanced Security Practitioner (CASP+) certification exam.

Syllabus
  • Introduction

    • Enterprise Security Operations
    • What you should know
    • About the exam
    1. Security Assessments
    • What are security assessments?
    • Vulnerability assessments
    • Physical security assessments
    • Malware analysis
    • Penetration testing
    • Penetration testing methods
    • Penetration testing steps: Reconnaissance
    • Penetration testing steps: Fingerprinting
    • Penetration testing steps: Exploitation
    • Penetration testing steps: Pivoting and covering tracks
    • Penetration testing steps: Social engineering
    • Internal vs. external audits
    • Self-assessments: Team exercises
    • Code reviews
    2. Tools Used in Security Assessments
    • What kinds of tools do we use for security assessments?
    • Port scanners
    • Vulnerability scanners
    • Protocol analyzers
    • SCAP scanners and tools
    • Network enumerator
    • Password crackers
    • Fuzzer
    • HTTP interceptor
    • Exploitation tools and frameworks
    • Visualization tools
    • Log reduction and analysis tools
    • File integrity monitoring and antivirus
    • Command line tools
    • Physical security tools
    • Reverse engineering tools
    3. Incident Response
    • Why are incident response and recovery so important?
    • E-discovery
    • Electronic inventory and asset control
    • Data retention policies
    • Data recovery and storage
    • Data ownership
    • Data handling
    • Legal holds
    • Data breach
    • Incident detection and response
    • Incident and emergency response
    • Chain of custody
    • Forensic analysis
    • Order of volatility
    • Continuity of operations and disaster recovery
    • Severity of the incident
    • Incident response team
    • Post-incident response
    4. Tools Used in Incident Response and Recovery
    • Tools used in incident response
    • Disk imaging
    • Network packet capture and analysis
    • nbtstat and netstat
    • Netcat
    • Memory forensics
    • File carving
    • FTK and EnCase
    • Specialized tools for mobile devices
    Conclusion
    • Next steps