UOP-CYB550: Technical Enterprise Security

(UOP-CYB550.AE1)
Lessons
Lab
TestPrep
Get A Free Trial

Skills You’ll Get

1

Host Security

  • Firewalls and Network Access Control
  • Host-Based Firewalls
  • Persistent Agent
  • Non-Persistent Agent
  • Agent-Based Technology
  • Agentless-Based Technology
  • Trusted Operating Systems
  • Endpoint Security Solutions
  • Anti-Malware
  • Host Hardening
  • Asset Management
  • Data Exfiltration
  • Intrusion Detection and Prevention
  • Network Management, Monitoring, and Security Tools
2

Application Security and Penetration Testing Part 1

  • Application Security Design Considerations
  • Specific Application Issues
  • Application Sandboxing
  • Application Security Frameworks
  • Software Assurance
  • Development Approaches
  • Secure Coding Standards
  • Documentation
  • Validation and Acceptance Testing
  • Application Exploits
  • Privilege Escalation
3

Application Security and Penetration Testing Part 2

  • Improper Storage of Sensitive Data
  • Secure Cookie Storage and Transmission
  • Context-Aware Management
  • Malware Sandboxing
  • Pivoting
  • Open-Source Intelligence
  • Memory Dumping
  • Client-Side Processing vs. Server-Side Processing
  • Security Assessments and Penetration Testing
  • Red, Blue, and White Teaming
  • Vulnerability Assessment Areas
  • Security Assessment and Penetration Test Tools
4

Risk Management

  • Risk Terminology
  • Identifying Vulnerabilities
  • Operational Risks
  • The Risk Assessment Process
  • Best Practices for Risk Assessments
5

Policies, Procedures, and Incident Response

  • A High-Level View of Documentation
  • Business Documents Used to Support Security
  • Documents and Controls Used for Sensitive Information
  • Training and Awareness for Users
  • Auditing Requirements and Frequency
  • The Incident Response Framework
  • Incident and Emergency Response
6

Security Research and Analysis

  • Applying Research Methods to Determine Industry Trends and Their Impact on the Enterprise
  • Analyze Scenarios to Secure the Enterprise
7

About

1

Host Security

  • Creating a Firewall Rule
  • Configuring Iptables
  • Testing an Antivirus Program
  • Using PuTTY
  • Running a Security Scanner to Identify Vulnerabilities
  • Bypassing Command Shell Restrictions
  • Using Netcat for Reverse Shell
2

Application Security and Penetration Testing Part 1

  • Attacking a Website using XSS Injection
  • Conducting Cross-site Request Forgery (CSRF or XSRF) Attacks
  • Using Exiftool
  • Using Burpsuite
  • Exploiting a Website Using SQL Injection
  • Performing ARP Poisoning
  • Scanning TCP Ports
  • Cracking a Password Using the John the Ripper Tool
3

Risk Management

  • Tracking Vulnerabilities in Software
  • Reviewing Security Policy
4

Policies, Procedures, and Incident Response

  • Using Netstat
  • Using TCPdump
  • Cracking Windows Password using Ophcrack

Any questions?
Check out the FAQs

Still have unanswered questions and need to get in touch?

Contact Us Now

Related Courses

All Courses
scroll to top