Pen Testing: End-user Behavior
IT Security
| Intermediate
- 14 Videos | 1h 47m 2s
- Includes Assessment
- Earns a Badge
Explore penetration testing, its limitations, and how end-user behavior affects this process in this 14-video course, which examines several types of penetration testing, the reliance on end-user behavior, and the challenges facing organizations. You will explore the role of human error in causing data breaches, user awareness, preventing attacks, and how to use end-user analytics. You will learn to use tools to perform user behavior analytics, and how to use test results to create and communicate reports. Next, learners will examine how to create a plan for organizations to check user behavior when a threat is received, and explore the need for cybersecurity training for employees. You will learn to use advanced analytics that focus on user activity instead of specific static threat indicators to detect anomalies or malicious behavior. You will explore social engineering attacks, how to perform a social engineering penetration test, and how to counter social engineering attacks. Finally, examine the role played by human behavior in penetration testing.
WHAT YOU WILL LEARN
-
discover the key concepts covered in this courseidentify penetration testing types and describe their reliance on end-user behaviordescribe the limitations of penetration testing and challenges for organizationsidentify the role of human error in causing data breachesdescribe the role of end-user awareness in preventing cybersecurity attacks and during penetration testingdescribe user behavior analytics and why it is important during penetration testingidentify tools for performing user behavior analytics
-
identify how to translate penetration testing results into a formalized report that can be used for the end-user awareness programrecognize social engineering attacks and how to they relate to penetration testingdescribe how to perform social engineering penetration testingdescribe the goals of social engineering penetration testsdescribe tips and tricks for preventing social engineering attacksdescribe the role of human behavior in penetration testingsummarize the key concepts covered in this course
IN THIS COURSE
-
1.Course Overview1m 39sUP NEXT
-
2.Penetration Testing Types9m 27s
-
3.Penetration Testing Weaknesses9m 31s
-
4.Human Error Data Breaches9m 25s
-
5.End-user Awareness8m 20s
-
6.User Behavior Analytics7m 13s
-
7.User Behavior Analytics Tools6m 29s
-
8.Penetration Testing Report8m 38s
-
9.Social Engineering Attacks8m 22s
-
10.Social Engineering Pen Testing11m 34s
-
11.Social Engineering Goals6m 12s
-
12.Social Engineering Countermeasures8m 32s
-
13.Human Behavior Penetration Testing10m 34s
-
14.Course Summary1m 6s
EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE
Skillsoft is providing you the opportunity to earn a digital badge upon successful completion of this course, which can be shared on any social network or business platform
Digital badges are yours to keep, forever.