Part 01 - Intro

Video Activity

This module is shorter than many of the previous ones since many of the topics have been covered in other modules, however, the broader subject matter is important and we cover it in more depth in this module. We note that security must extend beyond basic input validation and testing software for risks. It must expand to include checking for vulne...

Join over 3 million cybersecurity professionals advancing their career
Sign up with
or

Already have an account? Sign In »

Time
12 hours 41 minutes
Difficulty
Advanced
CEU/CPE
13
Video Description

This module is shorter than many of the previous ones since many of the topics have been covered in other modules, however, the broader subject matter is important and we cover it in more depth in this module. We note that security must extend beyond basic input validation and testing software for risks. It must expand to include checking for vulnerabilities in hosts and the network itself. The types of security assessments we'll be covering in this module are vulnerability and penetration. In addition, we'll be discussing: - Remediation - Intrusion detection - Audit logs - Common vulnerabilities

Video Transcription
00:04
all right now moving on to chapter six and Chapter six cover security assessment and testing. And we have talked about a little bit here and there about checking, you know, properly for input, validation, a few other things. But we're gonna expand beyond just testing software
00:24
for vulnerabilities and move on to looking at the network and individual hosts.
00:28
So when we do talk about this, this idea of security assessments, we'll talk about what the different types of security assessments are. How vulnerability assessments are different than penetration, testing, And what are the steps off pen testing? Ah, some remediation efforts. We found these problems. What do we do about them?
00:48
What are some solutions?
00:50
And then we'll talk about intrusion detection systems. Compare and contrast. Those two intrusion prevention systems will cover logs, audit logs and then some common vulnerabilities. So that's what we're gonna be covering in Chapter six
Up Next
ISC2 CISSP

Our free online CISSP (8 domains) training covers topics ranging from operations security, telecommunications, network and internet security, access control systems and methodology and business continuity planning.

Instructed By