• Online, Self-Paced
Course Description

In this course, you'll learn about enterprise security operations and explore numerous methods for conducting effective security assessments.

Learning Objectives

Security Assessment

  • start the course
  • describe security assessment methods
  • describe reconnaissance, fingerprinting, and social engineering
  • describe open-source intelligence
  • describe routing tables, DNS records, and search engines
  • describe security assessment types
  • describe penetration testing and assessments
  • define exercises and audits

Selecting Security Assessment Tools

  • describe scanners
  • define additional security assessment tools
  • describe types of host tools
  • specify physical security tools

Practice: Conducting Assessments

  • describe how to conduct security assessments

Framework Connections