CompTIA PenTest+: Attacks on Cloud Technologies
CompTIA PenTest+
| Intermediate
- 13 Videos | 1h 13m 29s
- Includes Assessment
- Earns a Badge
Penetration testers need to account for all types of systems available in an environment. In addition to servers and network appliances, this can also include cloud-based systems. In this course, you'll learn how to research attack vectors and perform attacks on cloud technologies. You'll explore common cloud-based attacks, such as credential harvesting, privilege escalation, and account takeovers. You'll learn how to identify misconfigured cloud assets, including identity and access management and containerization technologies. You'll move on to explore how cloud malware injection, denial of service, and side-channel attacks can exploit a system. Lastly, you'll learn about common cloud tools such as the software development kit. This course is one of a collection that helps prepare learners for the CompTIA PenTest+ (PT0-002) certification exam.
WHAT YOU WILL LEARN
-
discover the key concepts covered in this coursedescribe how credential harvesting can be used to amass a large number of credentialsdescribe how privilege escalation worksrecognize the characteristics of an account takeover (ATO) attackprovide an overview of metadata service attacksdescribe how misconfigurations can lead to cloud-based data breachesrecognize how to mitigate the risks of cloud resource exhaustion outages
-
provide an overview of cloud malware injection attackslist characteristics of a denial of service attackrecognize the signs of a side-channel attackrecognize signs of a direct-to-origin cyber attackdescribe how software development kit (SDK) can be used as a tool in cloud-based attackssummarize the key concepts covered in this course
IN THIS COURSE
-
1.Course Overview1m 29sUP NEXT
-
2.Credential Harvesting10m 8s
-
3.Privilege Escalation Attacks7m 7s
-
4.Account Takeover Attacks6m 46s
-
5.Metadata Service Attacks5m 41s
-
6.Cloud Asset Misconfigurations6m 13s
-
7.Cloud Resource Exhaustion4m 40s
-
8.Cloud Malware Injection Attacks4m 14s
-
9.Denial of Service Attacks6m 17s
-
10.Side-channel Attacks7m 26s
-
11.Direct-to-Origin Attacks7m 13s
-
12.Software Development Kit5m 23s
-
13.Course Summary53s
EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE
Skillsoft is providing you the opportunity to earn a digital badge upon successful completion of this course, which can be shared on any social network or business platform
Digital badges are yours to keep, forever.