In this course, you'll learn about enterprise security operations and explore numerous methods for conducting effective security assessments.
start the course
describe security assessment methods
describe reconnaissance, fingerprinting, and social engineering
describe open-source intelligence
describe routing tables, DNS records, and search engines
describe security assessment types
describe penetration testing and assessments
define exercises and audits
Selecting Security Assessment Tools
define additional security assessment tools
describe types of host tools
specify physical security tools
Practice: Conducting Assessments
describe how to conduct security assessments
The materials within this course focus on the Knowledge Skills and Abilities (KSAs) identified within the Specialty Areas listed below. Click to view Specialty Area details within the interactive National Cybersecurity Workforce Framework.