
Skills Update, March 5, 2021
We released 118 skills in the last week for these certifications and technologies:
Planning and Scoring for Penetration Testing
Information gathering and vulnerability scanning for penetration testing
Cisco Certified CyberOps Associate (200-201 CBROPS)
Cisco Collaboration Solutions and Architecture
Secure Design and Architecture Fundamentals For Enterprise Environments
Tools for Penetration Testing
Azure Relational Data: Working with it
Advanced Network Automation with Cisco & Python
Amazon Relational Database Service (Amazon RDS).
AWS Cloud Automation
Implementing Microsoft 365 Security and Threat Management
Configuring encryption, data access, and auditing in Microsoft SQL Server 2016
T-SQL: Data Management, Query Data and Program Databases
Microsoft SQL Server 2016: Monitoring and Managing Instances
Microsoft SQL Server 2016: Managing Backup and Restore Databases
Microsoft SQL Server 2016 High Availability & Disaster Recovery
How to Manage Microsoft SQL Server 2016 Storage
Implementing Microsoft SQL Server 2016 in Azure
Microsoft SQL Server 2016: Managing Instances and Databases
Microsoft SQL Server 2016: Developing Databases
Microsoft Active Directory
Penetration Testing Planning & Scoring
Scope Planning: Understanding the Need
Shawn Powers will discuss the importance of planning for a pentest marriage.
This Pen Testing training is available.
Understanding Key Legal Concepts
Shawn Powers will discuss the legal concepts that relate to penetration testing at a professional level.
This Pen Testing training is available.
Correctly Scoring an Engagement
Shawn Powers will teach you how to scope a penetration test for the client or audience involved. This includes considerations for the type and purpose of testing, as well as the desired outcome.
This Pen Testing training is available.
Explain Compliance-based Assessments
Shawn Powers will help you identify the key elements of compliance-based assessments, including policies, rules, and limitations.
This Pen Testing training is available.
Information gathering and vulnerability scanning for penetration testing
Conduct Information Gathering Using Appropriate Techniques
Shawn Powers will teach you how to gather information about clients, networks, businesses, and other people using pentesting techniques.
This Pen Testing training is available.
Do a vulnerability scan
Shawn Powers will teach you how to scan a network and find vulnerabilities.
This Pen Testing training is available.
Results of the vulnerability scan analysis
Shawn Powers will teach you how to analyze vulnerability scan results on clients, networks, or businesses using different pentesting methods.
This Pen Testing training is available.
Leverage Information for Exploitation
Shawn Powers will teach you how to explain the process for leveraging information to prepare for the exploitation systems.
This Pen Testing training is available.
Explain Weaknesses in Specialized Systems
Shawn Powers will teach you about the strengths and weaknesses of specialized systems compared to other systems.
This Pen Testing training is available.
Cisco Certified CyberOps Associate (200-201 CBROPS)
Security Concepts
John Munjoma will be covering fundamental security concepts, including common vulnerabilities and access control systems.
This CyberOps training is available.
Security Policies and Procedures
John Munjoma will be covering security frameworks as well as the management of incidents.
This CyberOps training is available.
Incident Response and Forensic Evidence Collection
Bob Salmans will be sharing his knowledge about incident response and forensic evidence collection. Both are directly from NIST SP 800 61 and NISTSP 800-86.
This CyberOps training is available.
Host Based Analysis
Bob Salmans will be sharing his knowledge about the process of analysing hosts for signs and indications of compromise. Learn about host-based security technologies and how to analyze a malware Sandbox report.
This Cyber Video is a Must-See