CompTIA PenTest+: Network-Based Exploits

Intermediate
  • 12 videos | 1h 18m
  • Includes Assessment
  • Earns a Badge
Rating 4.6 of 16 users Rating 4.6 of 16 users (16)
Discover how to exploit vulnerabilities in wired and wireless networks that take advantage of weaknesses at several layers of the OSI model. During this course, you will explore name resolution, SMB, FTP, DNS, and pass the hash exploits, as well as denial-of-service, NAC bypass and VLAN hopping. Other topics include evil twin, bluejacking, bluesnarfing, cloning, jamming, man-in-the-middle, and repeating. This course can be used as part of the preparation for the PT0-001: CompTIA PenTest+ certification exam. As a review exercise, you will name four weaknesses or specific attacks on WEP, list four scanner SMB auxiliary Metasploit modules, and list four of the five top DNS attacks during 2017/2018.

WHAT YOU WILL LEARN

  • Compare name resolution and smb exploits
    Exploit snmp and smtp protocols
    Describe ftp and dns exploits
    Define pass the hash
    Describe man-in-the-middle attacks
    Classify denial-of-service exploits
  • Describe nac bypass and vlan hopping
    Describe evil twin and deauthentication
    Classify fragmentation and wps exploits
    Compare bluejacking to bluesnarfing
    Identify cloning, jamming, and repeating
    Describe network exploits

IN THIS COURSE

  • 9m 24s
    In this video, find out how to compare name resolution and SMB exploits. FREE ACCESS
  • 7m 54s
    Learn how to exploit the SNMP and SMTP protocols. FREE ACCESS
  • Locked
    3.  FTP and DNS Exploits
    5m 53s
    Upon completion of this video, you will be able to describe FTP and DNS exploits. FREE ACCESS
  • Locked
    4.  Pass the Hash Exploits
    10m 26s
    In this video, find out how to define "pass the hash." FREE ACCESS
  • Locked
    5.  Man-in-the-Middle Attacks
    5m 51s
    Upon completion of this video, you will be able to describe man-in-the-middle attacks. FREE ACCESS
  • Locked
    6.  Denial-of-Service
    8m 43s
    In this video, you will learn how to classify denial-of-service attacks. FREE ACCESS
  • Locked
    7.  NAC Bypass and VLAN Hopping
    7m 34s
    After completing this video, you will be able to describe NAC bypass and VLAN hopping. FREE ACCESS
  • Locked
    8.  Evil Twin and Deauthentication
    10m 9s
    Upon completion of this video, you will be able to describe an evil twin and deauthentication. FREE ACCESS
  • Locked
    9.  Fragmentation and WPS Exploits
    4m 27s
    In this video, learn how to classify fragmentation and WPS exploits. FREE ACCESS
  • Locked
    10.  Bluejacking and Bluesnarfing
    2m 48s
    In this video, you will compare bluejacking to bluesnarfing. FREE ACCESS
  • Locked
    11.  Cloning, Jamming, and Repeating
    2m 8s
    Find out how to identify cloning, jamming, and repeating. FREE ACCESS
  • Locked
    12.  Exercise: Managing Network Exploits
    2m 42s
    Upon completion of this video, you will be able to describe network vulnerabilities. FREE ACCESS

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE

Rating 4.6 of 54 users Rating 4.6 of 54 users (54)
Rating 4.5 of 24 users Rating 4.5 of 24 users (24)

PEOPLE WHO VIEWED THIS ALSO VIEWED THESE

Rating 4.6 of 17 users Rating 4.6 of 17 users (17)
Rating 4.6 of 19 users Rating 4.6 of 19 users (19)
Rating 4.3 of 15 users Rating 4.3 of 15 users (15)