CISS Cert Prep - 6 Security Assessment and Testing
Learn about security assessment and testing practices needed to prepare for the Certified Information Systems Security Professional (CISSP) exam. CISSP—the industry's gold standard certification—is necessary for many top jobs. This course helps you approach the exam with confidence by providing coverage of key topics, including threat assessment, log monitoring, and software testing. It also covers disaster recovery and security process assessment. Students who complete this course will be prepared to answer questions on the sixth CISSP exam domain: Security Assessment and Testing.
Find the companion study books at the Sybex test prep site and review the complete CISSP Body of Knowledge at https://www.isc2.org/cissp-domains/default.aspx.
Note: This course is part of a series releasing throughout 2018. A completed Learning Path of the series will be available once all the courses are released.
Topics include:
Using security assessment tools
Scanning for vulnerabilities
Threat assessment techniques
Performing penetration testing
Reviewing monitor logs
Performing code reviews
Performing fuzz testing and misuse case testing
Analyzing coverage
Assessing disaster recovery sites and backups
Testing BC/DR plans
Collecting security process data and metrics
Auditing and control management
1 - Introduction
|
|
||
01. Welcome
|
02. What_you_need_to_know
|
2 - 1._Threat_Assessment
|
|
|
|
03. Security_assessment_tools
|
04. Scan_for_threats_and_vulnerabilties
|
05. Assess_threats
|
06. Threat_assessment_techniques
|
|
|
||
07. Penetration_testing
|
08. Advanced_vulnerability_scanning
|
3 - 2._Log_Monitoring
|
|
||
09. Monitor_log_files
|
10. Security_information_and_event_management
|
4 - 3._Software_Testing
|
|
|
|
11. Code_review
|
12. Code_tests
|
13. Fuzz_testing
|
14. Interface_testing
|
|
|
||
15. Misuse_case_testing
|
16. Test_coverage_analysis
|
5 - 4._Disaster_Recovery
|
|
|
|
17. Disaster_recovery_overview
|
18. Backups
|
19. Validating_backups
|
20. Disaster_recovery_sites
|
|
|||
21. Testing_BC_DR_plans
|
6 - 5._Assessing_Security_Processes
|
|
|
|
22. Collect_security_process_data
|
23. Management_review_and_approval
|
24. Security_metrics
|
25. Audits_and_assessments
|
|
|||
26. Control_management
|
7 - Conclusion
|
|||
27. What_s_next
|