Course Description
In this course, you'll learn about enterprise security operations and explore numerous methods for conducting effective security assessments.
Learning Objectives
Security Assessment
- start the course
- describe security assessment methods
- describe reconnaissance, fingerprinting, and social engineering
- describe open-source intelligence
- describe routing tables, DNS records, and search engines
- describe security assessment types
- describe penetration testing and assessments
- define exercises and audits
Selecting Security Assessment Tools
- describe scanners
- define additional security assessment tools
- describe types of host tools
- specify physical security tools
Practice: Conducting Assessments
- describe how to conduct security assessments