End-User Security: Securing End Users against Attackers
Security
| Beginner
- 10 Videos | 32m 49s
- Includes Assessment
- Earns a Badge
This 10-video course examines end-user security from the rogue attacker point of view, including motivations, Malware-as-a-Service (MaaS) phishing techniques, pharming, ransomware, data theft, cryptojacking, denial-of-service (DoS), and toolkits. One of the first things to do to be successful as a security technician or practitioner is to start to understand the mind of the attacker, so you will examine the possible motives for attacking user endpoints. You will then take a look at Malware-as-a-Service, which is available all over the world. You will explore the phishing techniques an attacker might take, as they are becoming stealthier, sending phishing e-mails over varied infrastructures. Delve into ransomware, this time from the attacker's perspective, and learn about data breaches and theft. You will also examine cryptojacking, what it is and explore some examples, and have a look at DoS and distributed-denial-of-service (DdoS) attacks using, for example, botnets. The final tutorial surveys common exploit kits such as Kali Linux and Metasploit. The concluding exercise entails listing common motives for attacking endpoints, common ransomware payloads, and exploit kits.
WHAT YOU WILL LEARN
-
discover the key concepts covered in this coursedescribe attack motivationdefine malware-as-a-servicecompare phishing techniquesdescribe ransomware
-
describe data breaches and theftdefine cryptojackingdescribe DoS and DDoS attackscompare common exploit kitslist common motives for attacking endpoints, common ransomware payloads, and exploit kits
IN THIS COURSE
-
1.Course Overview1m 31sUP NEXT
-
2.Motives for Attacking Endpoints4m
-
3.Malware-as-a-Service (MaaS)3m 34s
-
4.Phishing Techniques3m 30s
-
5.Ransomware5m 40s
-
6.Data Breach2m 3s
-
7.Cryptojacking3m 57s
-
8.Denial-of-Service4m 11s
-
9.Survey of Common Exploit Kits2m 55s
-
10.Exercise: End-User Security1m 28s
EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE
Skillsoft is providing you the opportunity to earn a digital badge upon successful completion of this course, which can be shared on any social network or business platform
Digital badges are yours to keep, forever.