Sample chapter: CompTIA Security+ Training Kit: Vulnerability Assessment and Management
This chapter from CompTIA Security+ Training Kit (Exam SY0-301) shows how to find exposed services and vulnerabilities on systems and devices by using port and vulnerability scanning tools, covers vulnerability assessment methods, as well as ways to identify vulnerabilities by using both technical and nontechnical means, and explains penetration testing, including common techniques, types of penetration tests, and best practices for performing them.
The CompTIA Security+ exam covers common techniques used to identify risks and vulnerabilities. Organizations frequently assess their risks and vulnerabilities by using both formal and informal techniques, as well as technical tools.
In this chapter, we will explore how you can find exposed services and vulnerabilities on systems and devices by using port and vulnerability scanning tools. We will discuss vulnerability assessment methods, as well as ways to identify vulnerabilities by using both technical and nontechnical means. Finally, we will explore the art of penetration testing, including common techniques, types of penetration tests, and best practices for performing them.
Exam objectives in this chapter:
Objective 3.7: Implement assessment tools and techniques to discover security threats and vulnerabilities
Vulnerability scanning and interpret results
Tools
Protocol analyzer
Sniffer
Vulnerability scanner
Honeypots
Honeynets
Port scanner
Risk calculations
- Threat vs. likelihood
Assessment types
Risk
Threat
Vulnerability
Assessment technique
Baseline reporting
Code review
Determine attack surface
Architecture
Design reviews
Objective 3.8: Within the realm of vulnerability assessments, explain the proper use of penetration testing versus vulnerability scanning
Penetration testing
Verify a threat exist
Bypass security controls
Actively test security controls
Exploiting vulnerabilities
Vulnerability scanning
Passively testing security controls
Identify vulnerability
Identify lack of security controls
Identify common misconfiguration
Black box
White box
Gray box
Read the complete chapter here: https://www.microsoftpressstore.com/articles/article.aspx?p=2224048.