CompTIA PenTest+: Attacks on Specialized Systems

CompTIA    |    Intermediate
  • 11 videos | 1h 14m 31s
  • Includes Assessment
  • Earns a Badge
Rating 4.7 of 14 users Rating 4.7 of 14 users (14)
Specialized systems by nature can be very challenging for penetration testers. They can use proprietary operating systems and file systems, and may require advanced reverse engineering and sandbox analysis. However, specialized systems are also very susceptible when it comes to weaknesses and vulnerabilities. In this course, you'll learn how to identify common attacks and vulnerabilities against specialized systems, including mobile systems and Internet of Things devices. You'll also explore common vulnerabilities, including data storage system vulnerabilities, management interface vulnerabilities, vulnerabilities related to virtual environments, and vulnerabilities related to containerized workloads. This course is one of a collection that helps prepare learners for the CompTIA PenTest+ (PT0-002) certification exam.

WHAT YOU WILL LEARN

  • Discover the key concepts covered in this course
    Recognize how to protect against mobile attacks
    Provide an overview of common mobile vulnerabilities such as certificate pinning and insecure storage
    List common mobile attack tools such as drozer and needle
    Recognize threats to internet of things (iot) devices such as ble attacks, data corruption, and data exfiltration
    Provide an overview of data storage system vulnerabilities such as misconfigurations and network exposure
  • Provide an overview of intelligent platform management interface (ipmi) vulnerabilities
    List common threats to supervisory control and data acquisition (scada), industrial internet of things (iiot), and industrial control system (ics) systems
    Describe common vulnerabilities found in virtual environments
    Describe common vulnerabilities related to containerized workloads
    Summarize the key concepts covered in this course

IN THIS COURSE

  • 1m 14s
  • 10m 11s
  • Locked
    3.  Common Mobile Vulnerabilities
    11m
  • Locked
    4.  Mobile Attack Tools
    6m 44s
  • Locked
    5.  Internet of Things Devices
    8m 56s
  • Locked
    6.  Data Storage System Vulnerabilities
    7m 58s
  • Locked
    7.  Management Interface Vulnerabilities
    5m 11s
  • Locked
    8.  Industrial System Vulnerabilities
    8m 14s
  • Locked
    9.  Virtual Environment Vulnerabilities
    8m 36s
  • Locked
    10.  Container Workload Vulnerabilities
    5m 41s
  • Locked
    11.  Course Summary
    47s

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE

Rating 4.5 of 64 users Rating 4.5 of 64 users (64)
Rating 4.6 of 38 users Rating 4.6 of 38 users (38)
Rating 5.0 of 4 users Rating 5.0 of 4 users (4)

PEOPLE WHO VIEWED THIS ALSO VIEWED THESE

Rating 4.8 of 27 users Rating 4.8 of 27 users (27)
Rating 4.8 of 13 users Rating 4.8 of 13 users (13)
Rating 4.7 of 19 users Rating 4.7 of 19 users (19)