Threat and Vulnerability Management Competency

Topics covered:

  • discuss true positives and negatives as well as false positives and negatives

  • manage threat indicators

  • identify and prioritize risk mitigation techniques

  • explore CVSS severity levels

  • identify commonalities shared amongst bug bounties

  • recall how overflow attacks work

  • list different types of cross-site scripting attacks

  • use the BeEF tool to hack a web browser

  • describe how the use of insecure XML components can lead to web application compromise

  • list common web application vulnerabilities

  • use the OWASP ZAP tool to test web application security

  • use the slowhttptest command to run a DoS attack against an HTTP web site

  • describe ARP poisoning attacks

  • use Kali Linux to execute an ARP poisoning MiTM attack

  • recognize how malicious users use a variety of password attacks to compromise user accounts

  • use the hydra tool to brute force a Windows RDP connection

  • use John the Ripper to crack user passwords

  • recognize how SEDs provide protection for data at rest

  • recognize how HSMs are used for encryption offloading and the storage of cryptographic secrets

  • provide examples of PaaS

  • provide examples of SaaS

  • deploy cloud resources using a JSON template

  • identify how ITIL influences efficient service delivery, including change management implementation

  • recognize the benefits of VDI

  • configure an Amazon Workspaces VDI environment

  • connect a client device to an Amazon Workspace VDI

  • list how different types of firewalls protect digital assets

  • configure a Windows host firewall

  • configure an Amazon Web Services Network Security Group

  • describe the role NAC plays in securing a network environment

Last updated