Discovery and Attack Vectors

Cybersecurity    |    Beginner
  • 10 Videos | 45m 16s
  • Includes Assessment
  • Earns a Badge
The discovery phase includes performing different types of reconnaissance on a target. To accomplish this, attackers can use a series of techniques, exploits, and tools. In this course, learn about common attack vectors such as malware, social engineering, and session hijacking. Discover how to collect legacy and archived web page content using discovery tools, and learn how to identify domains and IP addresses using the Netcraft website. Explore how to maximize command-line tools to discover shares and local network configurations, and learn the importance of checking to see if targets are using default passwords. You'll also discover how footprinting can be used to extract details of a website, how to disable NetBIOS, how to use kali to perform banner grabbing. Lastly, discover countermeasure techniques such as using generic domain names, hardening systems, and turning off unnecessary protocols and services. This course was originally created by Global Knowledge (GK). 

WHAT YOU WILL LEARN

  • recognize the role of the discovery phase in a security investigation
    list common attack vectors such as malware, social engineering, and session hijacking
    collect legacy and archived web page content using discovery tools
    demonstrate how to identify domains and ip addresses using the Netcraft website
    describe the importance of checking to see if targets are using default passwords
  • demonstrate how to use command line tools to discover shares and local network configurations
    describe how footprinting can be used to extract details of a website
    use kali to perform banner grabbing
    list discovery countermeasure techniques such as using generic domain names, hardening systems, and turning off unnecessary protocols and services
    disable NetBIOS over TCP/IP

IN THIS COURSE

  • Playable
    1. 
    Discovery Phase
    45s
    UP NEXT
  • Playable
    2. 
    Common Attack Vectors
    10m 6s
  • Locked
    3. 
    Collecting Legacy Web Page Content
    4m 39s
  • Locked
    4. 
    Identify Domains and IP Addresses
    5m 15s
  • Locked
    5. 
    Identify Default Passwords
    1m 26s
  • Locked
    6. 
    Discovering Local Resources
    4m 1s
  • Locked
    7. 
    Footprinting Web Services
    3m 40s
  • Locked
    8. 
    Performing Banner Grabbing
    2m 48s
  • Locked
    9. 
    Discovery Countermeasures
    9m 13s
  • Locked
    10. 
    Disabling NetBIOS
    3m 24s

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion of this course, which can be shared on any social network or business platform

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE

Likes 3 Likes 3