Final Exam: Vulnerability Analyst
Overview/Description
Expected Duration
Lesson Objectives
Course Number
Expertise Level
Overview/Description
Final Exam: Vulnerability Analyst will test your knowledge and application of the topics presented throughout the Vulnerability Analyst track of the Skillsoft Aspire Security Analyst to Security Architect Journey.
Expected Duration (hours)
0.0
Lesson Objectives Final Exam: Vulnerability Analyst
block an attacker after failed login attempts
block an attacker after too many failed login attempts
compare between public and private keys and their ciphers
configure a deny-first firewall using ufw
configure a firewall to block all but a trust subnet
configure a firewall to block untrusted egress
configure an NGINX HTTP service to prevent insecure file access
configure a secure vpn client to connect to a vpn server
describe advantages and disadvantages of various approaches to IPS
describe a network design approach from a security mindset
describe approaches to IPS and how it differs from IDS
describe approaches to secure coding practices
describe authentication threats and non-repudiation
describe authenticity and identity spoofing threats
describe common coding pitfalls that lead to security vulnerabilities
describe effective incident tracking practices
describe how incident tracking can be integrated into an organization
describe how to validate integrity and tampering threats
describe industry standards and the application domains they apply to
describe information threats such as privacy breaches or data leaks
describe methods and tools that can be used to help secure software through automation and testing
describe methods of authentication and their best practices
describe methods of authorization and access control
describe methods of brute force attacks and key sizes
describe methods of keeping login and authentication credentials secure
describe methods used to discover vulnerabilities
describe metrics used to measure the effectiveness of incident tracking
describe options and deployment strategies for IPS
describe practical approaches to secure coding practices
describe security concerns when adopting new technologies, coding languages, and platforms
describe some of the cyber-security regulations when it comes to tracking and responding to incidents
describe the categories of vulnerabilities using the STRIDE model
describe the challenges and deficiencies of traditional security architectures
describe the challenges of a secure-first network design
describe the continuous monitoring approach to active incident tracking
describe the dangers of file upload remote execution
describe the life cycle of an attack and how it is tracked
describe the network forensic approach to computer networks
describe the network security concerns for hybrid cloud models
describe the placement and use of sniffing and IDS sensors
describe the principles that define a security architecture
describe the process and potential security flaws in security architecture implementation
describe the security benefit of reproducible builds
describe the threat of user account discovery and how it is carried out
describe the tools and techniques used by intrusion detection systems
describe the use of encryption methods and best practices in implementing encryption
describe the zero-trust model
describe the zero-trust model for security
differentiate between public and private keys and their ciphers
handle security policy trade-offs in situations where solutions might not align with policy
identify how incident tracking can be integrated into an organization
perform a targeted remote scan using Nmap
perform IDS with Snort
perform IDS with Snort using a sample ruleset
perform nmap scans using methods to evade IDS detection
recognize examples of security misconfiguration threats
use password security tools to enforce a strong password policy
use the local /etc/hosts to block unwanted connections
use tools to scan for potential intrusions on a local system
use Wireshark to inspect network packets
Course Number: it_fesasa_03_enus
Expertise Level
Intermediate