O'Reilly logo

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

CompTIA Security+ SY0-201 Video Course Domain 4 - Assessments and Audits

Video Description

Assessments and Audits

Shon Harris

The fast, powerful way to prepare for your CompTIA Security+ exam!

Get all the hands-on training you need to pass (ISC)²’s tough SSCP exam, get certified, and move forward in your IT security career! In this online video, the world’s #1 information security trainer walks you through every skill and concept you’ll need to master. This online video contains over two and a half hours of training adapted from Shon Harris’s legendary five-day SSCP boot camps–including realistic labs, scenarios, case studies, and animations designed to build and test your knowledge in real-world settings!

Comprehensive coverage of CompTIA Security+ domains of knowledge:

     .    Risk Management

     .    Risk Types

     .    Remote Access

     .    Testing Steps

     .    Network Performance Monitoring

     .    Safe Disposal

About the Shon Harris Security Series

This online video is part of a complete library of books, online services, and videos designed to help security professionals enhance their skills and prepare for their certification exams. Every product in this series reflects Shon Harris’s unsurpassed experience in teaching IT security professionals.

Category: Security

System Requirements

OPERATING SYSTEM: Windows 2000, XP, or Vista; Mac OS X 10.4 (Tiger) or later
MULTIMEDIA: DVD drive; 1024 x 768 or higher display; sound card with speakers
COMPUTER: 500MHz or higher CPU; 128MB RAM or more

Table of Contents

  1. Course Introduction 00:06:59
  2. Domain 4 - Assessments and Audits 00:00:56
  3. Risk Management 00:00:56
  4. Why Is Risk Management Difficult? 00:01:24
  5. Necessary Level of Protection Is Different for Each Organization 00:00:56
  6. Security Team/Committee 00:01:42
  7. Risk Management Process 00:00:30
  8. Planning Stage - Team 00:01:05
  9. Planning Stage - Scope 00:02:04
  10. Planning Stage - Analysis Method 00:01:01
  11. Risk Management Tools 00:01:50
  12. Defining Acceptable Levels 00:02:24
  13. Acceptable Risk Level 00:00:52
  14. Collecting and Analyzing Data Methods 00:01:04
  15. What Is a Company Asset? 00:00:48
  16. Data Collection - Identify Assets 00:01:01
  17. Data Collection - Assigning Values 00:01:34
  18. Asset Value 00:01:03
  19. Data Collection - Identify Threats 00:01:20
  20. Data Collection - Calculate Risks 00:01:38
  21. Scenario Based - Qualitative 00:00:43
  22. Risk Approach 00:00:40
  23. Qualitative Analysis Steps 00:00:56
  24. Want Real Answers? 00:00:53
  25. Qualitative Risk Analysis Ratings 00:01:02
  26. Quantitative Analysis Steps 00:01:37
  27. How Often Will This Happen? 00:00:37
  28. ARO Values and Their Meaning 00:03:27
  29. ALE Value Uses 00:00:48
  30. Relationships 00:00:29
  31. Calculate Risks - ALE Example 00:01:46
  32. Your Turn! 00:00:20
  33. ALE Calculation 00:00:56
  34. Can a Purely Quantitative Analysis Be Accomplished? 00:01:25
  35. Risk Types 00:00:39
  36. Examples of Types of Losses 00:00:35
  37. Delayed Loss 00:00:50
  38. Cost/Benefit Analysis 00:00:58
  39. Cost of a Countermeasure 00:01:21
  40. Cost/Benefit Analysis Countermeasure Criteria 00:02:55
  41. Calculating Cost/Benefit 00:01:01
  42. Controls 00:02:01
  43. Quantitative Analysis 00:02:09
  44. Qualitative Analysis Disadvantages 00:00:49
  45. Can You Get Rid of All Risk? 00:02:34
  46. Uncertainty Analysis 00:01:11
  47. Dealing with Risk 00:01:20
  48. Management's Response to Identified Risks 00:01:51
  49. Risk Acceptance 00:01:42
  50. Risk Analysis Process Summary 00:01:09
  51. Remote Access Security 00:03:16
  52. Remote Access 00:01:31
  53. Administering Systems Remotely 00:01:36
  54. Facsimile Security 00:01:32
  55. Support Systems 00:01:24
  56. Agenda 6 00:00:58
  57. Testing for Vulnerabilities 00:01:05
  58. Vulnerability Assessments 00:00:15
  59. Security Testing Issues 00:02:07
  60. Vulnerability Scanning 00:00:48
  61. Basic Scanner 00:00:55
  62. Data Leakage - Keystroke Logging 00:00:58
  63. Password Cracking 00:02:10
  64. One of Many Tools 00:00:35
  65. War Dialing 00:00:39
  66. PhoneSweep 00:00:37
  67. Wardialing Output 00:00:27
  68. War Driving 00:00:40
  69. Wireless Reconnaissance Output 00:01:27
  70. Wireless Attacks 00:01:19
  71. Penetration Testing 00:02:52
  72. Testing Steps 00:01:19
  73. Testing Methodology 00:02:59
  74. Automated Pen Testing Tools Canvas Operation 00:01:00
  75. Penetration Testing 00:01:18
  76. Automated Pen Testing Tools Core Impact Operation 00:00:37
  77. Post-Testing and Assessment Steps 00:02:14
  78. Penetration Testing Variations 00:00:55
  79. Types of Testing 00:01:17
  80. Protection Mechanism - Honeypot 00:01:49
  81. Log Reviews 00:01:05
  82. Nmap 00:01:21
  83. Nmap - Options 00:00:51
  84. Nmap - Command line 00:00:46
  85. Nmap (2) 00:00:36
  86. Zenmap 00:00:20
  87. OVAL 00:04:37
  88. Network Performance Monitoring 00:01:17
  89. Network Monitoring 00:01:00
  90. Network Monitoring - Features 00:01:41
  91. System Monitoring 00:03:28
  92. Performance Baseline 00:01:23
  93. Establishing a Performance Baseline 00:01:21
  94. Monitoring Methodologies 00:00:04
  95. Signature Based Monitoring 00:00:49
  96. Behavior Based Monitoring 00:01:10
  97. Anomaly Based Monitoring 00:01:12
  98. Statistical Based Monitoring 00:00:35
  99. Log Management 00:03:04
  100. Logging Activities 00:01:19
  101. Log Reviews 00:01:49
  102. Security Logs 00:01:02
  103. Protecting Access to System Logs 00:01:00
  104. Accountability = Auditing Events 00:01:14
  105. Auditing 00:01:07
  106. Privilege Auditing 00:00:41
  107. Usage Auditing 00:00:46
  108. Escalation Auditing 00:00:43
  109. Retention and Storage 00:00:38
  110. Retention and Storage Policies 00:01:27
  111. Data Retention and Storage 00:02:02
  112. Resource Protection 00:00:53
  113. Library Maintenance 00:01:06
  114. Media Labels 00:01:19
  115. Software Escrow 00:01:27
  116. Weak Link 00:00:17
  117. Liabilities of Insecure Disposal of Information 00:00:24
  118. Devastating to the Company 00:01:17
  119. Safe Disposal 00:00:16
  120. Degaussing 00:00:27
  121. Zeroization 00:01:30
  122. Physical Destruction 00:00:21
  123. Remaining Data 00:00:25
  124. Why Not Just Delete the Files? 00:01:46
  125. Domain 4 Review 00:01:05