CompTIA PenTest+: Network-Based Exploits

Intermediate
  • 12 Videos | 1h 23m 30s
  • Includes Assessment
  • Earns a Badge
Likes 32 Likes 32
Discover how to exploit vulnerabilities in wired and wireless networks that take advantage of weaknesses at several layers of the OSI model. During this course, you will explore name resolution, SMB, FTP, DNS, and pass the hash exploits, as well as denial-of-service, NAC bypass and VLAN hopping. Other topics include evil twin, bluejacking, bluesnarfing, cloning, jamming, man-in-the-middle, and repeating. This course can be used as part of the preparation for the PT0-001: CompTIA PenTest+ certification exam. As a review exercise, you will name four weaknesses or specific attacks on WEP, list four scanner SMB auxiliary Metasploit modules, and list four of the five top DNS attacks during 2017/2018.

WHAT YOU WILL LEARN

  • compare name resolution and SMB exploits
    exploit SNMP and SMTP protocols
    describe FTP and DNS exploits
    define pass the hash
    describe man-in-the-middle attacks
    classify denial-of-service exploits
  • describe NAC bypass and VLAN hopping
    describe evil twin and deauthentication
    classify fragmentation and WPS exploits
    compare bluejacking to bluesnarfing
    identify cloning, jamming, and repeating
    describe network exploits

IN THIS COURSE

  • Playable
    1. 
    Name Resolution and SMB Exploits
    9m 24s
    UP NEXT
  • Playable
    2. 
    SNMP and SMTP Exploits
    7m 54s
  • Locked
    3. 
    FTP and DNS Exploits
    5m 53s
  • Locked
    4. 
    Pass the Hash Exploits
    10m 26s
  • Locked
    5. 
    Man-in-the-Middle Attacks
    5m 51s
  • Locked
    6. 
    Denial-of-Service
    8m 43s
  • Locked
    7. 
    NAC Bypass and VLAN Hopping
    7m 34s
  • Locked
    8. 
    Evil Twin and Deauthentication
    10m 9s
  • Locked
    9. 
    Fragmentation and WPS Exploits
    4m 27s
  • Locked
    10. 
    Bluejacking and Bluesnarfing
    2m 48s
  • Locked
    11. 
    Cloning, Jamming, and Repeating
    2m 8s
  • Locked
    12. 
    Exercise: Managing Network Exploits
    2m 42s

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion of this course, which can be shared on any social network or business platform

Digital badges are yours to keep, forever.

PEOPLE WHO VIEWED THIS ALSO VIEWED THESE

Likes 21 Likes 21  
Likes 24 Likes 24  
Likes 122 Likes 122