CompTIA Cybersecurity Analyst+: Network Reconnaissance & Security Policies
Cyber Security
| Intermediate
- 12 Videos | 1h 8m 32s
- Includes Assessment
- Earns a Badge
Gathering information regarding network vulnerabilities is a critical step in thwarting potential exploits. Explore network reconnaissance and security policies, including logging, traffic intercepts, and hacking techniques.
WHAT YOU WILL LEARN
-
explain how to discover network devicesuse logs to learn about the network environmentuse packet capturing tools for network traffic analysiscapture and interpret FTP and HTTP trafficdiscover network configurationsexplain harvesting techniques
-
recognize social engineering techniquesidentify details within acceptable use policiesidentify details within data ownership and retention policiesidentify details within data classification policiesidentify details within a password policyrecognize various network configurations and perform network reconnaissance
IN THIS COURSE
-
1.Topology, Service Discovery, and OS Fingerprinting10m 25sUP NEXT
-
2.Reviewing Logs8m 12s
-
3.Packet Capturing6m 46s
-
4.Capture FTP and HTTP Traffic6m 9s
-
5.Network Infrastructure Discovery4m 8s
-
6.E-mail and DNS Harvesting4m 52s
-
7.Social Engineering and Phishing5m 59s
-
8.Acceptable Use Policy3m 13s
-
9.Data Ownership and Retention Policy3m 24s
-
10.Data Classification Policy9m 6s
-
11.Password Policy2m 48s
-
12.Exercise: Network Architecture and Reconnaissance3m 33s
EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE
Skillsoft is providing you the opportunity to earn a digital badge upon successful completion of this course, which can be shared on any social network or business platform
Digital badges are yours to keep, forever.