Sample chapter: CompTIA Security+ Training Kit: Vulnerability Assessment and Management

This chapter from CompTIA Security+ Training Kit (Exam SY0-301) shows how to find exposed services and vulnerabilities on systems and devices by using port and vulnerability scanning tools, covers vulnerability assessment methods, as well as ways to identify vulnerabilities by using both technical and nontechnical means, and explains penetration testing, including common techniques, types of penetration tests, and best practices for performing them.

The CompTIA Security+ exam covers common techniques used to identify risks and vulnerabilities. Organizations frequently assess their risks and vulnerabilities by using both formal and informal techniques, as well as technical tools.

In this chapter, we will explore how you can find exposed services and vulnerabilities on systems and devices by using port and vulnerability scanning tools. We will discuss vulnerability assessment methods, as well as ways to identify vulnerabilities by using both technical and nontechnical means. Finally, we will explore the art of penetration testing, including common techniques, types of penetration tests, and best practices for performing them.

Exam objectives in this chapter:

Objective 3.7: Implement assessment tools and techniques to discover security threats and vulnerabilities

  • Vulnerability scanning and interpret results

  • Tools

    • Protocol analyzer

    • Sniffer

    • Vulnerability scanner

    • Honeypots

    • Honeynets

    • Port scanner

  • Risk calculations

    • Threat vs. likelihood
  • Assessment types

    • Risk

    • Threat

    • Vulnerability

  • Assessment technique

    • Baseline reporting

    • Code review

    • Determine attack surface

    • Architecture

    • Design reviews

Objective 3.8: Within the realm of vulnerability assessments, explain the proper use of penetration testing versus vulnerability scanning

  • Penetration testing

    • Verify a threat exist

    • Bypass security controls

    • Actively test security controls

    • Exploiting vulnerabilities

  • Vulnerability scanning

    • Passively testing security controls

    • Identify vulnerability

    • Identify lack of security controls

    • Identify common misconfiguration

  • Black box

  • White box

  • Gray box

Read the complete chapter here: https://www.microsoftpressstore.com/articles/article.aspx?p=2224048.