CompTIA Cybersecurity Analyst+: Exploits & Security Practices
Cyber Security
| Intermediate
- 14 Videos | 1h 1m 16s
- Includes Assessment
- Earns a Badge
Exploits take form not only as technical entities, but also as employee workplace violations. Explore common exploits, including spoofing, packet forgery, and rootkits, and discover best practices for prevention.
WHAT YOU WILL LEARN
-
recognize proper hiring practicesprovision new user accounts in accordance with organizational security policiesapply personnel management best practicesdistinguish the difference between threats, vulnerabilities, and exploitsexplain the concept of spoofingcraft forged packets using free toolsrecognize how impersonation can be used to gain unauthorized access
-
recognize CSS attacksrecognize root kitsexplain the concept of privilege escalationdistinguish the difference between common exploit toolsuse Metasploit tools to further understand the attacker toolsetuse Kali Linux tools to further understand the attacker toolsetcrack passwords
IN THIS COURSE
-
1.Hiring and Background Checks4m 1sUP NEXT
-
2.User Onboarding and Offboarding4m 25s
-
3.Personnel Management Best Practices2m 48s
-
4.Threats, Vulnerabilities, and Exploits3m 29s
-
5.Spoofing3m 25s
-
6.Packet Forgery Using Kali Linux4m 51s
-
7.Impersonation6m 7s
-
8.Cross-site Scripting4m 33s
-
9.Root Kits4m 44s
-
10.Privilege Escalation3m 56s
-
11.Common Exploit Tools2m 28s
-
12.Exploring the Metasploit Suite of Tools5m 6s
-
13.Exploring the Kali Linux Suite of Tools2m 45s
-
14.Password Cracking8m 40s
EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE
Skillsoft is providing you the opportunity to earn a digital badge upon successful completion of this course, which can be shared on any social network or business platform
Digital badges are yours to keep, forever.