O'Reilly logo

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

SSCP Video Course Domain 4 - Analysis and Monitoring

Video Description

Analysis and Monitoring

Shon Harris

The fast, powerful way to prepare for your SSCP exam!

Get all the hands-on training you need to pass (ISC)²’s tough SSCP exam, get certified, and move forward in your IT security career! In this online video, the world’s #1 information security trainer walks you through every skill and concept you’ll need to master. This online video contains over three and a half hours of training adapted from Shon Harris’s legendary five-day SSCP boot camps–including realistic labs, scenarios, case studies, and animations designed to build and test your knowledge in real-world settings!

Comprehensive coverage of SSCP domains of knowledge:

     .    Security Auditing

     .    Control Checks

     .    Network Mapping

     .    Security Monitoring Issues

     .    Event Logging

     .    Responses to Attacks

About the Shon Harris Security Series

This online video is part of a complete library of books, online services, and videos designed to help security professionals enhance their skills and prepare for their certification exams. Every product in this series reflects Shon Harris’s unsurpassed experience in teaching IT security professionals.

Category: Security

System Requirements

OPERATING SYSTEM: Windows 2000, XP, or Vista; Mac OS X 10.4 (Tiger) or later
MULTIMEDIA: DVD drive; 1024 x 768 or higher display; sound card with speakers
COMPUTER: 500MHz or higher CPU; 128MB RAM or more

Table of Contents

  1. Course Introduction 00:17:17
  2. Domain 4 - Analysis and Monitoring 00:00:47
  3. Security Auditing 00:00:34
  4. What Are Security Audits? 00:00:53
  5. Why Are Security Audits Performed? 00:03:07
  6. Audit Participant's Role 00:01:53
  7. Defining the Audit Scope 00:02:20
  8. Defining the Audit Plan 00:00:47
  9. Audit Data Collection Methods 00:03:24
  10. Post Audit Activities 00:02:17
  11. Controls 00:01:53
  12. Control Checks 00:01:48
  13. Control Checks - User Access Control 00:00:39
  14. Control Checks - Network Access 00:02:53
  15. Network Configurations 00:00:42
  16. DMZ Configurations 00:03:24
  17. Firewall Comparisons 00:04:48
  18. Network Devices - Firewalls 00:01:52
  19. Host Isolation - Audit Questions 00:02:22
  20. Firewalls - Audit Questions 00:01:25
  21. Intrusion Detection System 00:01:55
  22. IDS - Audit Questions 00:02:11
  23. Network Monitoring 00:01:13
  24. Control Checks - Monitoring 00:02:02
  25. Monitoring - Audit Questions 00:01:40
  26. Control Checks - System Hardening 00:03:15
  27. Patching - Audit Questions 00:01:07
  28. Control Checks - Anti-Virus 00:01:06
  29. Control Checks - Encryption 00:01:52
  30. Control Checks - Logging 00:01:14
  31. Protecting Access to System Logs 00:01:07
  32. Audit Process 00:03:24
  33. Security Testing 00:00:48
  34. Overview 00:01:18
  35. Why? 00:00:58
  36. When? 00:01:12
  37. Who? 00:02:30
  38. Security Testing Goals 00:01:49
  39. Security Testing - Tools 00:01:25
  40. Before Carrying Out Vulnerability Testing 00:01:43
  41. Testing for Vulnerabilities 00:01:06
  42. Vulnerability Assessments 00:02:23
  43. Security Testing Issues 00:05:32
  44. Vulnerability Scanning 00:00:52
  45. Vulnerability Scans 00:01:05
  46. Penetration Testing (1) 00:02:28
  47. Penetration Testing Variations 00:01:40
  48. Types of Testing 00:03:11
  49. Step In Attack Chart 00:04:53
  50. Testing Steps 00:02:15
  51. Automated Pen Testing Tools CanvasT Operation 00:01:43
  52. Penetration Testing (2) 00:03:15
  53. Automated Pen Testing Tools Core ImpactT Operation 00:01:07
  54. Test Type Chart 00:03:35
  55. Reconnaissance 00:00:53
  56. Reconnaissance - Social Engineering 00:00:47
  57. Reconnaissance - WHOIS Information 00:00:42
  58. Reconnaissance - DNS Zone Transfer 00:03:11
  59. Network Mapping 00:01:51
  60. Network Mapping - Host/Port Mapping 00:00:55
  61. Vulnerability Assessment 00:01:05
  62. Security Gateway Testing 00:00:39
  63. Security Monitoring Testing 00:02:11
  64. Weeding Out False Positives 00:01:18
  65. Security Monitoring 00:00:51
  66. Post-Testing and Assessment Steps 00:01:01
  67. Motivation Behind Attacks 00:00:50
  68. Intrusions 00:01:19
  69. What Is Acceptable? 00:01:07
  70. Security Monitoring for Everyday Life 00:00:48
  71. Security Monitoring for Computing Systems 00:01:46
  72. Security Monitoring Issues 00:02:47
  73. Monitoring Terminologies 00:04:35
  74. Intrusion Detection Systems 00:01:13
  75. IDS Categories 00:00:56
  76. Network-based IDS 00:01:21
  77. Host-based IDS 00:02:33
  78. Anomaly Detection 00:01:22
  79. Signature-based IDS 00:01:43
  80. IDS as a Patch for Firewall 00:01:23
  81. Event Logging 00:01:45
  82. Event Logging - Usefulness 00:00:54
  83. Log Sources 00:01:24
  84. Centralized Logging infrastructure 00:01:19
  85. Log Reviews 00:00:47
  86. Logging Priority 00:01:09
  87. Secure Logging 00:01:40
  88. Event Alerting and Interpretation 00:01:32
  89. Accountability = Auditing Events 00:01:43
  90. Security Monitoring Evasion 00:03:12
  91. Obfuscation 00:01:04
  92. Fragmentation 00:00:35
  93. Encryption 00:02:09
  94. Overloading 00:00:44
  95. Slow Scans 00:00:47
  96. Log Alteration 00:01:25
  97. Security Monitoring Implementation Issues 00:00:47
  98. Criticality Based Deployment 00:02:07
  99. Maintenance and Tuning 00:00:50
  100. Data Collection for Incident Response 00:01:00
  101. Monitoring Response Techniques 00:01:33
  102. Active Response Pitfalls 00:01:14
  103. IDS 00:02:12
  104. IDS Steps 00:01:26
  105. Network IDS Sensors 00:02:00
  106. Host IDS 00:01:31
  107. Combination 00:01:38
  108. Types of IDSs 00:02:32
  109. Signature-Based Example 00:02:29
  110. Behavior-Based IDS 00:03:32
  111. Statistical Anomaly 00:01:05
  112. Statistical IDS 00:00:45
  113. Protocol Anomaly 00:01:45
  114. What Is a Protocol Anomaly? 00:01:30
  115. Protocol Anomaly Issues 00:00:48
  116. Traffic Anomaly 00:03:47
  117. IDS Response Mechanisms 00:01:10
  118. Responses to Attacks 00:01:37
  119. IDS Issues 00:01:55
  120. Intrusion Prevention System 00:02:43
  121. Vulnerable IDS 00:00:47
  122. Trapping an Intruder 00:01:43
  123. Domain 4 Review 00:01:31