End-User Security: Securing End Users against Attackers

Security    |    Beginner
  • 10 videos | 32m 49s
  • Includes Assessment
  • Earns a Badge
Rating 4.1 of 291 users Rating 4.1 of 291 users (291)
This 10-video course examines end-user security from the rogue attacker point of view, including motivations, Malware-as-a-Service (MaaS) phishing techniques, pharming, ransomware, data theft, cryptojacking, denial-of-service (DoS), and toolkits. One of the first things to do to be successful as a security technician or practitioner is to start to understand the mind of the attacker, so you will examine the possible motives for attacking user endpoints. You will then take a look at Malware-as-a-Service, which is available all over the world. You will explore the phishing techniques an attacker might take, as they are becoming stealthier, sending phishing e-mails over varied infrastructures. Delve into ransomware, this time from the attacker's perspective, and learn about data breaches and theft. You will also examine cryptojacking, what it is and explore some examples, and have a look at DoS and distributed-denial-of-service (DdoS) attacks using, for example, botnets. The final tutorial surveys common exploit kits such as Kali Linux and Metasploit. The concluding exercise entails listing common motives for attacking endpoints, common ransomware payloads, and exploit kits.

WHAT YOU WILL LEARN

  • Discover the key concepts covered in this course
    Describe attack motivation
    Define malware-as-a-service
    Compare phishing techniques
    Describe ransomware
  • Describe data breaches and theft
    Define cryptojacking
    Describe dos and ddos attacks
    Compare common exploit kits
    List common motives for attacking endpoints, common ransomware payloads, and exploit kits

IN THIS COURSE

  • 1m 31s
  • 4m
    Upon completion of this video, you will be able to describe the motivation for an attack. FREE ACCESS
  • Locked
    3.  Malware-as-a-Service (MaaS)
    3m 34s
    In this video, find out how to define malware as a service. FREE ACCESS
  • Locked
    4.  Phishing Techniques
    3m 30s
    In this video, you will compare phishing techniques. FREE ACCESS
  • Locked
    5.  Ransomware
    5m 40s
    Upon completion of this video, you will be able to describe ransomware. FREE ACCESS
  • Locked
    6.  Data Breach
    2m 3s
    Upon completion of this video, you will be able to describe data breaches and data theft. FREE ACCESS
  • Locked
    7.  Cryptojacking
    3m 57s
    In this video, you will learn how to define cryptojacking. FREE ACCESS
  • Locked
    8.  Denial-of-Service
    4m 11s
    Upon completion of this video, you will be able to describe DoS and DDoS attacks. FREE ACCESS
  • Locked
    9.  Survey of Common Exploit Kits
    2m 55s
    During this video, you will learn how to compare common exploit kits. FREE ACCESS
  • Locked
    10.  Exercise: End-User Security
    1m 28s
    After completing this video, you will be able to list common motives for attacking endpoints, common ransomware payloads, and common exploit kits. FREE ACCESS

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE

Rating 4.6 of 239 users Rating 4.6 of 239 users (239)
Rating 4.5 of 33 users Rating 4.5 of 33 users (33)
Rating 4.6 of 80 users Rating 4.6 of 80 users (80)

PEOPLE WHO VIEWED THIS ALSO VIEWED THESE

Rating 4.3 of 120 users Rating 4.3 of 120 users (120)
Rating 4.6 of 1991 users Rating 4.6 of 1991 users (1991)
Rating 4.6 of 56 users Rating 4.6 of 56 users (56)