CompTIA PenTest+: Network-Based Exploits

Intermediate
  • 12 videos | 1h 18m
  • Includes Assessment
  • Earns a Badge
Likes 47 Likes 47
Discover how to exploit vulnerabilities in wired and wireless networks that take advantage of weaknesses at several layers of the OSI model. During this course, you will explore name resolution, SMB, FTP, DNS, and pass the hash exploits, as well as denial-of-service, NAC bypass and VLAN hopping. Other topics include evil twin, bluejacking, bluesnarfing, cloning, jamming, man-in-the-middle, and repeating. This course can be used as part of the preparation for the PT0-001: CompTIA PenTest+ certification exam. As a review exercise, you will name four weaknesses or specific attacks on WEP, list four scanner SMB auxiliary Metasploit modules, and list four of the five top DNS attacks during 2017/2018.

WHAT YOU WILL LEARN

  • compare name resolution and SMB exploits
    exploit SNMP and SMTP protocols
    describe FTP and DNS exploits
    define pass the hash
    describe man-in-the-middle attacks
    classify denial-of-service exploits
  • describe NAC bypass and VLAN hopping
    describe evil twin and deauthentication
    classify fragmentation and WPS exploits
    compare bluejacking to bluesnarfing
    identify cloning, jamming, and repeating
    describe network exploits

IN THIS COURSE

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.

Digital badges are yours to keep, forever.

PEOPLE WHO VIEWED THIS ALSO VIEWED THESE