Threat and Vulnerability Management Competency
Topics covered:
discuss true positives and negatives as well as false positives and negatives
manage threat indicators
identify and prioritize risk mitigation techniques
explore CVSS severity levels
identify commonalities shared amongst bug bounties
recall how overflow attacks work
list different types of cross-site scripting attacks
use the BeEF tool to hack a web browser
describe how the use of insecure XML components can lead to web application compromise
list common web application vulnerabilities
use the OWASP ZAP tool to test web application security
use the slowhttptest command to run a DoS attack against an HTTP web site
describe ARP poisoning attacks
use Kali Linux to execute an ARP poisoning MiTM attack
recognize how malicious users use a variety of password attacks to compromise user accounts
use the hydra tool to brute force a Windows RDP connection
use John the Ripper to crack user passwords
recognize how SEDs provide protection for data at rest
recognize how HSMs are used for encryption offloading and the storage of cryptographic secrets
provide examples of PaaS
provide examples of SaaS
deploy cloud resources using a JSON template
identify how ITIL influences efficient service delivery, including change management implementation
recognize the benefits of VDI
configure an Amazon Workspaces VDI environment
connect a client device to an Amazon Workspace VDI
list how different types of firewalls protect digital assets
configure a Windows host firewall
configure an Amazon Web Services Network Security Group
describe the role NAC plays in securing a network environment
Last updated