• Online, Self-Paced
Course Description

Discover enterprise security operations and explore numerous methods for conducting effective security assessments. In this course, you will review security assessment methods, reconnaissance, fingerprinting, social engineering, and open-source intelligence. Next, you will examine routing tables, DNS records, search engines, and security assessment types. You will then consider penetration testing and assessments and look at exercises and audits. Finally, you will be introduced to scanners, additional security assessment tools, and several types of host tools.

Learning Objectives

{"describe security assessment methods"}

Framework Connections