Final Exam: Vulnerability Analyst


Overview/Description
Expected Duration
Lesson Objectives
Course Number
Expertise Level



Overview/Description

Final Exam: Vulnerability Analyst will test your knowledge and application of the topics presented throughout the Vulnerability Analyst track of the Skillsoft Aspire Security Analyst to Security Architect Journey.



Expected Duration (hours)
0.0

Lesson Objectives

Final Exam: Vulnerability Analyst

  • block an attacker after failed login attempts
  • block an attacker after too many failed login attempts
  • compare between public and private keys and their ciphers
  • configure a deny-first firewall using ufw
  • configure a firewall to block all but a trust subnet
  • configure a firewall to block untrusted egress
  • configure an NGINX HTTP service to prevent insecure file access
  • configure a secure vpn client to connect to a vpn server
  • describe advantages and disadvantages of various approaches to IPS
  • describe a network design approach from a security mindset
  • describe approaches to IPS and how it differs from IDS
  • describe approaches to secure coding practices
  • describe authentication threats and non-repudiation
  • describe authenticity and identity spoofing threats
  • describe common coding pitfalls that lead to security vulnerabilities
  • describe effective incident tracking practices
  • describe how incident tracking can be integrated into an organization
  • describe how to validate integrity and tampering threats
  • describe industry standards and the application domains they apply to
  • describe information threats such as privacy breaches or data leaks
  • describe methods and tools that can be used to help secure software through automation and testing
  • describe methods of authentication and their best practices
  • describe methods of authorization and access control
  • describe methods of brute force attacks and key sizes
  • describe methods of keeping login and authentication credentials secure
  • describe methods used to discover vulnerabilities
  • describe metrics used to measure the effectiveness of incident tracking
  • describe options and deployment strategies for IPS
  • describe practical approaches to secure coding practices
  • describe security concerns when adopting new technologies, coding languages, and platforms
  • describe some of the cyber-security regulations when it comes to tracking and responding to incidents
  • describe the categories of vulnerabilities using the STRIDE model
  • describe the challenges and deficiencies of traditional security architectures
  • describe the challenges of a secure-first network design
  • describe the continuous monitoring approach to active incident tracking
  • describe the dangers of file upload remote execution
  • describe the life cycle of an attack and how it is tracked
  • describe the network forensic approach to computer networks
  • describe the network security concerns for hybrid cloud models
  • describe the placement and use of sniffing and IDS sensors
  • describe the principles that define a security architecture
  • describe the process and potential security flaws in security architecture implementation
  • describe the security benefit of reproducible builds
  • describe the threat of user account discovery and how it is carried out
  • describe the tools and techniques used by intrusion detection systems
  • describe the use of encryption methods and best practices in implementing encryption
  • describe the zero-trust model
  • describe the zero-trust model for security
  • differentiate between public and private keys and their ciphers
  • handle security policy trade-offs in situations where solutions might not align with policy
  • identify how incident tracking can be integrated into an organization
  • perform a targeted remote scan using Nmap
  • perform IDS with Snort
  • perform IDS with Snort using a sample ruleset
  • perform nmap scans using methods to evade IDS detection
  • recognize examples of security misconfiguration threats
  • use password security tools to enforce a strong password policy
  • use the local /etc/hosts to block unwanted connections
  • use tools to scan for potential intrusions on a local system
  • use Wireshark to inspect network packets
  • Course Number:
    it_fesasa_03_enus

    Expertise Level
    Intermediate