CompTIA Cybersecurity Analyst+: Exploits & Security Practices

Cyber Security    |    Intermediate
  • 14 videos | 1h 1m 16s
  • Includes Assessment
  • Earns a Badge
Rating 4.3 of 12 users Rating 4.3 of 12 users (12)
Exploits take form not only as technical entities, but also as employee workplace violations. Explore common exploits, including spoofing, packet forgery, and rootkits, and discover best practices for prevention.

WHAT YOU WILL LEARN

  • Recognize proper hiring practices
    Provision new user accounts in accordance with organizational security policies
    Apply personnel management best practices
    Distinguish the difference between threats, vulnerabilities, and exploits
    Explain the concept of spoofing
    Craft forged packets using free tools
    Recognize how impersonation can be used to gain unauthorized access
  • Recognize css attacks
    Recognize root kits
    Explain the concept of privilege escalation
    Distinguish the difference between common exploit tools
    Use metasploit tools to further understand the attacker toolset
    Use kali linux tools to further understand the attacker toolset
    Crack passwords

IN THIS COURSE

  • 4m 1s
    Upon completion of this video, you will be able to recognize and follow proper hiring practices. FREE ACCESS
  • 4m 25s
    In this video, you will provision new user accounts in accordance with organizational security policies. FREE ACCESS
  • Locked
    3.  Personnel Management Best Practices
    2m 48s
    Find out how to apply best practices in personnel management. FREE ACCESS
  • Locked
    4.  Threats, Vulnerabilities, and Exploits
    3m 29s
    In this video, learn how to distinguish the difference between threats, vulnerabilities, and exploits. FREE ACCESS
  • Locked
    5.  Spoofing
    3m 25s
    After completing this video, you will be able to explain the concept of spoofing. FREE ACCESS
  • Locked
    6.  Packet Forgery Using Kali Linux
    4m 51s
    In this video, you will learn how to create forged packets using free tools. FREE ACCESS
  • Locked
    7.  Impersonation
    6m 7s
    Upon completion of this video, you will be able to recognize how impersonation can be used to gain unauthorized access. FREE ACCESS
  • Locked
    8.  Cross-site Scripting
    4m 33s
    After completing this video, you will be able to recognize CSS-based attacks. FREE ACCESS
  • Locked
    9.  Root Kits
    4m 44s
    Upon completion of this video, you will be able to recognize rootkits. FREE ACCESS
  • Locked
    10.  Privilege Escalation
    3m 56s
    After completing this video, you will be able to explain the concept of privilege escalation. FREE ACCESS
  • Locked
    11.  Common Exploit Tools
    2m 28s
    In this video, learn how to distinguish the difference between common exploit and tools. FREE ACCESS
  • Locked
    12.  Exploring the Metasploit Suite of Tools
    5m 6s
    During this video, you will learn how to use Metasploit tools to further understand the tools attackers use. FREE ACCESS
  • Locked
    13.  Exploring the Kali Linux Suite of Tools
    2m 45s
    Learn how to use Kali Linux tools to further understand the tools attackers use. FREE ACCESS
  • Locked
    14.  Password Cracking
    8m 40s
    In this video, you will learn how to crack passwords. FREE ACCESS

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE

Rating 5.0 of 3 users Rating 5.0 of 3 users (3)
Rating 4.6 of 123 users Rating 4.6 of 123 users (123)
Rating 5.0 of 2 users Rating 5.0 of 2 users (2)

PEOPLE WHO VIEWED THIS ALSO VIEWED THESE

Rating 4.6 of 32 users Rating 4.6 of 32 users (32)
Rating 4.6 of 102 users Rating 4.6 of 102 users (102)
Rating 4.6 of 242 users Rating 4.6 of 242 users (242)