Security Analysis with SPARTA
*(ISC)² Members/Associates can access this course for free by logging in above and clicking the 'My Courses' menu item.
SPARTA’s design automates many common vulnerability assessment tasks and is commonly used for network infrastructure penetration and security testing. This tool is primarily focused on aiding security testers and researchers during the scanning and enumeration phase of an engagement. It saves the tester time by automating and providing point-and-click access to output generated by SPARTA. In this hands on lab course, participants review and apply internal security assessments and white hat penetration testing by using SPARTA on an unfamiliar network. They gain experience performing scans on a local network to find live machines and locate open network ports and services, then find weaknesses in some of these services and explore ways to mitigate them.
This course includes the following modules: 1) Analysis of a Subnet 2) Gain Access to MySQL 3) Brute-Force Access to a Machine 4) Analyze Nikto Results 5) Access and Close Backdoor Shell 6) Mount Remote NFS Share
Audience or Who Should Take This Course
Security practitioners and anyone looking at implementing the penetration testing execution standard (PTES) and the tools and processes found within SPARTA and security assessment tools. Expected familiarity using the Unix/Linux command line and a working understanding of both web applications (HTTP, URL parameters, etc.) and networking concepts (TCP/IP, DNS, etc.) is assumed.
Knowledge of cybersecurity concepts.
How This Course Works
Lab content within this course take place within a Linux virtual machine environment. Learners are introduced to each section of the lab and will have the ability to work through the entire lab at their own pace. Included within each section is a video walkthrough for additional support. Learners will have seven days to work through the lab before progress resets.
To receive a certificate of completion and earn 2 Group A CPE credits towards (ISC)² credentials, all objectives within the virtual lab environment must be met, a course evaluation completed and a score of 70% or higher on the final assessment. Note: You have seven days to complete the lab before your progress resets. If you need support, each section of the lab has a video walkthrough found within the course modules.
Members must self-report CPEs earned through the (ISC)² CPE portal. At the end of the course instructions will be provided for downloading the certificate. It is important to retain the certificate of completion as proof of credits earned. CPEs earned for this course may be eligible for continuing professional education credits for non-(ISC)² certifications. Please visit the continuing education requirements established by the credentialing organization for eligibility.