CompTIA Cybersecurity Analyst+: Attack Types
Cybersecurity Analyst+
| Intermediate
- 21 Videos | 1h 51m 30s
- Includes Assessment
- Earns a Badge
Helping protect your company's valuable assets against malicious attacks by outsiders requires a seasoned understanding of modern-day cyber threats. This 21-video course prepares learners to thwart reconnaissance and surveillance attacks by hackers and ward off Wi-Fi vulnerabilities, by using the proper tools. First, examine the wide variety of possible modes of attack-from injection, overflow, and cross-site scripting to XML (extensible markup language), DoS, address resolution protocol (ARP) poisoning, and password compromises. Then develop valuable skills in counteracting web browser compromises and agility in the use of Kali Linux Wi-Fi tools. Learn OWASP's (Open Web Application Security Project) Top 10 vulnerabilities and ESAPI (Enterprise Security application programming interface) tools for each one, such as ZAP (Zed Attack Proxy), to test web application security. While you're learning, pause to meet the aptly-named John the Ripper, a free tool for cracking passwords on 15 platforms! The course helps to prepare learners for CompTIA+ Cybersecurity Analyst+ (CySA+) CS0-002 certification exam.
WHAT YOU WILL LEARN
-
discover the key concepts covered in this courserecognize how information gathering is the first step in hackinguse the Metasploit Framework to generate e-mail listslist common Wi-Fi network vulnerabilities and mitigation strategiesdescribe common Wi-Fi attack techniquesuse Kali Linux Wi-Fi toolsharden a Wi-Fi routerrecognize how injection attacks can lead to sensitive data disclosurerecall how overflow attacks worklist different types of cross-site scripting attacksuse the BeEF tool to hack a web browser
-
describe how the use of insecure XML components can lead to web application compromiselist common web application vulnerabilitiesuse the OWASP ZAP tool to test web application securityuse the slowhttptest command to run a DoS attack against an HTTP web sitedescribe ARP poisoning attacksuse Kali Linux to execute an ARP poisoning MiTM attackrecognize how malicious users use a variety of password attacks to compromise user accountsuse the hydra tool to brute force a Windows RDP connectionuse John the Ripper to crack user passwordssummarize the key concepts covered in this course
IN THIS COURSE
-
1.Course Overview2m 20sUP NEXT
-
2.Reconnaissance4m 37s
-
3.E-mail Harvesting2m 39s
-
4.Wi-Fi Vulnerabilities6m 4s
-
5.Wi-Fi Attacks5m 20s
-
6.Wi-Fi Tools2m 47s
-
7.Wi-Fi Hardening5m 18s
-
8.Injection Attacks8m 40s
-
9.Overflow Attacks7m 33s
-
10.Cross-site Scripting Attacks5m 51s
-
11.Web Browser Compromise10m 3s
-
12.XML Attacks3m 56s
-
13.OWASP Top 108m 44s
-
14.Testing Web Application Security5m 38s
-
15.DoS Attacks5m 8s
-
16.ARP Poisoning5m 25s
-
17.Executing ARP Poisoning6m 59s
-
18.Password Attacks6m 40s
-
19.Hydra Password Attack3m 4s
-
20.John the Ripper3m 26s
-
21.Course Summary1m 17s
EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE
Skillsoft is providing you the opportunity to earn a digital badge upon successful completion of this course, which can be shared on any social network or business platform
Digital badges are yours to keep, forever.