Systems Security Professional Essentials Labs

Code: E003 Category: Tag:

Learn the security techniques used by the Internet’s most skilled professionals. This Systems Security Essentials lab bundle, which includes 32 distinct, hands-on labs, will prepare you with the essential principles of risk management, network security, identity and access management, security operations and more.

This lab bundle is designed to align to the learning objectives found in the (ISC)2 Certified Information Systems Security Professional certification — Course 2058, CISSP® Training and Certification Prep Course.

Systems Security Professional Essentials Labs Delivery Methods
6-month access to CYBRScore Systems Security Professional Essentials Labs
Content aligned to (ISC)2 Certified Information Systems Security Professional certification
Systems Security Professional Essentials Labs Course Benefits
Practice the objectives presented in the (ISC)2 Certified Information Systems Security Professional certificationUnderstand the principles of risk management, network security, identity and access management, security operations and moreIdentify whether high-risk systems were affected in an attackAnalyze, update, and perform a gap analysis on a sample BCP/BIA/DRP/CIRP
Systems Security Professional Lab Content
Analyze and Update a Company BCP/BIA/DRP/CIRP

Students will become familiar with the Business Continuity Plan (BCP), Business Impact Assessment (BIA), Disaster Recovery Plan (DRP) and Computer Incident Response Plan (CIRP). Each of these documents are used to address different, but related, aspects of continuing or recovering business functionality during/after an incident. During the course of the lab, students will perform a gap analysis using the provided BCP, BIAs and DRP, and make the necessary fixes to the DRP.

Analyze SQL Injection Attack
Analyze Structured Exception Handler Buffer Overflow Exploit
Applying Filters to TCPDump and Wireshark
Baseline Systems in Accordance with Policy Documentation
Creating a Baseline Using the Windows Forensic Toolchest (WFT)
Creating a List of Installed Programs, Services and User Accounts from a WIN2K12 Server
Creating a Secondary Baseline and Conducting Comparison
Creation of Standard Operating Procedures for Recovery
Data Backup and Recovery
Firewall Setup and Configuration
Identify Access to a LINUX Firewall Through SYSLOG Service
Identify Whether High-Risk Systems Were Affected
Identifying System Vulnerabilities with OpenVAS
IDS Setup
Implementing Least-Privilege on Windows
Linux Users and Groups
Log Correlation & Analysis to Identify Potential IOC
Manual Vulnerability Assessments
Manually Analyze Malicious PDF Documents
Manually Analyze Malicious PDF Documents 2
Microsoft Baseline Security Analyzer
Monitoring and Verifying Management Systems
Monitoring Network Traffic for Potential IOA/IOC
Network Segmentation (FW/DMZ/WAN/LAN)
Parse Files Out of Network Traffic
Patch Installation and Validation Testing
Performing Incident Response in a Windows Environment
Scanning and Mapping Networks
Securing Linux for System Administrators
Use pfTop to Analyze Network Traffic
Vulnerability Identification and Remediation

Request Quotes

Register now
CAPTCHA image

Please type the characters This helps us prevent spam, thank you.

Risk Management Training for Projects, Programs, and Operations

Computer Forensics Boot Camp Training

Designing Cisco Software-Defined Access Solutions (SDADS)

Microsoft Dynamics 365 Field Service Training (MB-240)

Advanced Developing on AWS

Managing Modern Desktops (MD-101)

Advanced Python: Best Practices and Design Patterns

Leading Through a Crisis

Enterprise Product Owner Training (ICP-EPO Certification)

Selling Cisco SD-WAN (SCSDW)

arالعربية