Certified Information Systems Security Professional (CISSP)

(ITP-CISSP.AA1)
Lab
Get A Free Trial

Skills You’ll Get

1

Understand and Apply Threat Modeling Concepts and Methodologies

  • Identifying Virus Threats
2

Apply Cryptography

  • Encrypting the Disk
  • Using OpenSSL to Create a Public/Private Key Pair
  • Generating a Symmetric Key
  • Applying Symmetric Key Encryption
  • Generating an Asymmetric Key
  • Generating an RSA Key Pair
  • Observing an MD5-Generated Hash Value
  • Observing an SHA-Generated Hash Value
  • Revoking and Exporting a Certificate
  • Creating an Autoenrollment Certificate
  • Using Social Engineering Techniques to Plan an Attack
  • Performing a Man-in-the-Middle Attack
3

Implement Secure Design Principles in Network Architectures

  • Tracing Route Using Tracert
  • Adding an IPv6 Address
  • Configuring Network Address Translation
  • Obtaining Information about Different IP versions
  • Getting the TCP Settings
  • Getting Information about the TCP Ports
  • Getting Information about the UDP Ports
  • Getting the UDP Settings
  • Configuring a Class A IP Address
  • Configuring a Class B IP Address
  • Configuring a Class C IP Address
  • Getting Information about DNS
  • Obtaining the ARP Cache
  • Configuring a Switch to Learn its IP Address with DHCP
  • Using the Ping command
4

Secure Network Components

  • Configuring Static Routing
  • Setting Up a Honeypot
  • Configuring VLANs
5

Implement Secure Communication Channels According to Design

  • Configuring a VPN
  • Performing DoS Attack with SYN Flood
  • Defending against IP Spoofing
6

Manage Identification and Authentication of People, Devices, and Services

  • Creating a Password Policy in Windows
  • Configuring a Password Policy
  • Installing AD DS and Promoting the Server to a Domain Controller
  • Setting Up Kerberos Delegation
  • Performing Session Hijacking Using Burp Suite
7

Manage the Identity and Access Provisioning Lifecycle

  • Defending Against a Buffer Overflow Attack
8

Conduct Security Control Testing

  • Observing Traffic Patterns Using Wireshark
  • Using the John the Ripper Tool
  • Scanning Using nmap
9

Understand and Support Investigations

  • Completing the Chain of Custody
10

Conduct Logging and Monitoring Activities

  • Conducting Vulnerability Scanning Using Nessus
11

Apply Resource Protection Techniques

  • Configuring RAID 5
12

Implement Recovery Strategies

  • Taking an Incremental Backup
  • Taking a Full Backup
13

Identify and Apply Security Controls in Development Environments

  • Exploiting a Website Using SQL Injection

Related Courses

All Courses
scroll to top