It is important for security professionals to be aware of various security assessment and penetration testing techniques and methods. In this course, explore key assessment techniques like intelligence fusion, threat hunting, threat feeds, advisories and bulletins, vulnerability scans, and false positives/false negatives. You will also examine the fundamentals of penetration testing including black/blue/gray box methodologies, lateral movement , privilege escalation, persistence, and pivoting. Other topics include passive and active reconnaissance as well as the different exercise teams. This course can be used in preparation for the CompTIA Security+ SY0-601 certification exam.
describe threat hunting concepts such as intelligence fusion, threat feeds, advisories, bulletins, and maneuvers
survey vulnerability scanning terms like false positives, false negatives, and credentialed vs. non-credentialed
define additional vulnerability scanning tools and techniques like common vulnerabilities and exposures (CVE), common vulnerability scoring system (CVSS), and configuration review
compare syslog and SIEM system techniques such as review reports, packet captures, data inputs, user behavior analysis (UBA) and sentiment analysis
describe the characteristics of security orchestration, automation, response (SOAR) systems
describe pen testing terms such as white box, black box, and gray box
survey fundamental methods for pen testing like lateral movement, privilege escalation, persistence, and pivoting
describe passive reconnaissance as it relates to pen testing as in drones/unmanned aerial vehicle (UAV), war flying, and war driving
describe active reconnaissance techniques such as footprinting
compare exercise teams as in red, blue, white, and purple teams