CompTIA PenTest+: Network-Based Exploits
Intermediate
- 12 videos | 1h 18m
- Includes Assessment
- Earns a Badge
Discover how to exploit vulnerabilities in wired and wireless networks that take advantage of weaknesses at several layers of the OSI model. During this course, you will explore name resolution, SMB, FTP, DNS, and pass the hash exploits, as well as denial-of-service, NAC bypass and VLAN hopping. Other topics include evil twin, bluejacking, bluesnarfing, cloning, jamming, man-in-the-middle, and repeating. This course can be used as part of the preparation for the PT0-001: CompTIA PenTest+ certification exam. As a review exercise, you will name four weaknesses or specific attacks on WEP, list four scanner SMB auxiliary Metasploit modules, and list four of the five top DNS attacks during 2017/2018.
WHAT YOU WILL LEARN
-
compare name resolution and SMB exploitsexploit SNMP and SMTP protocolsdescribe FTP and DNS exploitsdefine pass the hashdescribe man-in-the-middle attacksclassify denial-of-service exploits
-
describe NAC bypass and VLAN hoppingdescribe evil twin and deauthenticationclassify fragmentation and WPS exploitscompare bluejacking to bluesnarfingidentify cloning, jamming, and repeatingdescribe network exploits
IN THIS COURSE
-
9m 24s
-
7m 54s
-
5m 53s
-
10m 26s
-
5m 51s
-
8m 43s
-
7m 34s
-
10m 9s
-
4m 27s
-
2m 48s
-
2m 8s
-
2m 42s
EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE
Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.
Digital badges are yours to keep, forever.