Final Exam: Security Analyst


Overview/Description
Expected Duration
Lesson Objectives
Course Number
Expertise Level



Overview/Description

Final Exam: Security Analyst will test your knowledge and application of the topics presented throughout the Security Analyst track of the Skillsoft Aspire Security Analyst to Security Architect Journey.



Expected Duration (hours)
0.0

Lesson Objectives

Final Exam: Security Analyst

  • classify the various types of honeypots that can be used
  • classify the various types of security protocols
  • compare governance and management
  • compare pen testing and vulnerability assessments
  • compare the types of risk responses that an organization may adapt
  • compare the various types of honeypots that can be used
  • compare VMs and containers
  • compare VMs and containers characteristics
  • configure a VPN to protect data
  • configure a VPN to protect data in motion
  • configure file encryption to protect data at rest
  • define an Advanced Persistent Threat and its purpose
  • define continuous security monitoring and list its benefits
  • define the risk assessment processes that can help you protect your assets
  • define the secure DevOps lifecycle
  • describe best practices for working with and handling corporate information while traveling
  • describe honeypot uses
  • describe how employee training, awareness, and advocacy should be implemented and how it plays a crucial role in the protection of an organization's information
  • describes the benefits of Continuous Security
  • describe subnetting and its advantages
  • describe the characteristics of APTs as well as their goals and objectives
  • describe the elements used in designing goals of a security topology
  • describe the importance of securing mobile devices
  • describe the motives behind an APT and the probable targets
  • describe the process of rolling out a security governance program
  • describe the role physical security plays in the protection of corporate data
  • describe the target selection for pen testing
  • describe the various types of DNS attacks and their mitigations
  • describe types of security topologies
  • discover the key concepts covered in this course
  • discuss network demilitarized zones and how they help protect corporate information
  • discuss the problems presented by organizational and personal e-mail, and best practices for working with e-mail, including how to protect yourself from spam
  • distinguish between governance and management
  • distinguish between pen testing and vulnerability assessments
  • identify the key point for creating an effective checklist for NAC Security
  • identify the phases of the secure DevOps lifecycle
  • identify the risks introduced by BYOD and IoT along with their preventive measures
  • identify the security risks introduced by BYOD and IoT
  • identify the security risks introduced by BYOD and IoT along with their preventive measures
  • identify the threat actors
  • identify the types of weak protocols and their replacements
  • identify the various roles and responsibilities of senior management in governance
  • identify the various types of security protocols
  • identify the various types of tools used in pen testing
  • list best practices related to IT security auditing
  • list the NAC authentication methods
  • list the steps of the APT lifecycle
  • list the threats, vulnerabilities, and mitigation techniques in a network security
  • recognize how HTTP session management can affect security
  • recognize the deployment strategies of a honeypot
  • scan hosts for security weaknesses from Linux
  • specify how honeypots are placed in a network
  • specify how social engineering is conducted and how it can be mitigated through corporate policy
  • specify the importance of implementing organizational security programs and why companies that don't have them put themselves at risk
  • specify the proper ways to handle sensitive company information, including the differences between working with online data and physical media
  • specify the top kinds of security threats facing organizations today
  • specify what network hardening is and how it relates to the protection of corporate information
  • use Group Policy to enable file system auditing
  • use Group Policy to implement user account hardening
  • view a packet capture to identify suspicious activity
  • Course Number:
    it_fesasa_01_enus

    Expertise Level
    Intermediate