CompTIA Pentest+ PT0-002 – Section 2: Planning an Engagement Part 4
10. Planning a Test (OBJ 1.2) When it comes to penetration testing, planning is incredibly important. There are three major factors for any assessment, time, cost, and quality. These three factors are always in competition with each other, and decisions on their priority have to be agreed upon between the penetration tester and the organization… Read More »
CompTIA Pentest+ PT0-002 – Section 2: Planning an Engagement Part 3
8. PenTest Methodologies (OBJ 1.2) Every penetration test should follow a specific methodology. Now, a methodology is defined as “a system of methods used in a particular area of study or activity.” In terms of penetration testing, it refers to the systematic approach that a penetration tester is going to use before, during, and after… Read More »
CompTIA Pentest+ PT0-002 – Section 2: Planning an Engagement Part 2
6. Risk Handling (OBJ 1.2) When we talk about risk, we have to think about what we can do about risk as an organization. After you conclude your penetration test, one of the biggest deliverables you’re going to have is a final report to your client’s organization that lists all the vulnerabilities you found, how… Read More »
CompTIA Pentest+ PT0-002 – Section 2: Planning an Engagement Part 1
4. Planning an Engagement (OBJ 1.1, 1.2, and 1.3) In this section of the course, we’re going to cover the various considerations that you need to think of when you’re planning an engagement. in the world of penetration testing, the term engagement simply means a singular penetration testing project that has been planned and scoped… Read More »
Cisco CCNP Security 300-710 SNCF – Cisco NGFW Firepower Threat Defense (FTD) Part 13
50. Lecture-50:Introduction and Concept of Network Discovery Policy. First of all we gonna do network discovery policy, okay? So what is network discovery policy? Basically whatever in your network. Maybe devices, maybe Host and maybe application. So it’s collect the information which can help you and your intrusion policy. So after this, we going to… Read More »
Cisco CCNP Security 300-710 SNCF – Cisco NGFW Firepower Threat Defense (FTD) Part 12
49. Lecture-49:Configure and Verify Malware and File Policy Lab. In this section we gonna do labor file policy and malware policy. OK? Which is all together. So we are using the same lab. I have an external server which is windows seven. This is the windows seven. And this windows seven is an external server.… Read More »
Cisco CCNP Security 300-710 SNCF – Cisco NGFW Firepower Threat Defense (FTD) Part 11
48. Lecture-48:Introduction and Concept of Malware & File Policy. Next policy is malware and file policy. Keep in mind it’s been combined. So basically it’s two policy which has been combined and worked together. Malware. We know Malaysia software, it’s an umbrella term and we discuss in many courses and also in this course I… Read More »
Cisco CCNP Security 300-710 SNCF – Cisco NGFW Firepower Threat Defense (FTD) Part 10
47. Lecture-47:Configure and Verify SSL Decryption Policy FTD Lab. So in this part we gonna do SSL policy lab. So we will use the same lab which we are using since last two, three weeks. I have internal three PC, PC three which is window PC one three and gateway is 254. And I have… Read More »
Cisco CCNP Security 300-710 SNCF – Cisco NGFW Firepower Threat Defense (FTD) Part 9
45. Lecture-45:Configure and Verify Pre-Filtering Policy in FTD Lab. Will do prefilter policy layer. We will use the same topology here FTD inside 1254, outside one one 4254. There is a default out to send everything to 1141 we have to external server for test purpose one one 4250 and 251. Management of FTD is… Read More »
Cisco CCNP Security 300-710 SNCF – Cisco NGFW Firepower Threat Defense (FTD) Part 8
42. Lecture-42:Introduction and Concept of DNS Policy in Cisco FTD. Time we discuss about security intelligence. What is Security intelligence. So, it’s a complete team of Cisco and they get all the detail, you know, Malaysia’s domain, Malaysia IP and their URL domain, all those details, they have a full database. And last time we… Read More »