Pen Testing: End-user Behavior

IT Security
  • 14 Videos | 1h 53m 2s
  • Includes Assessment
  • Earns a Badge
Likes 13 Likes 13
Explore penetration testing, its limitations, and how end-user behavior affects this process in this 14-video course, which examines several types of penetration testing, the reliance on end-user behavior, and the challenges facing organizations. You will explore the role of human error in causing data breaches, user awareness, preventing attacks, and how to use end-user analytics. You will learn to use tools to perform user behavior analytics, and how to use test results to create and communicate reports. Next, learners will examine how to create a plan for organizations to check user behavior when a threat is received, and explore the need for cybersecurity training for employees. You will learn to use advanced analytics that focus on user activity instead of specific static threat indicators to detect anomalies or malicious behavior. You will explore social engineering attacks, how to perform a social engineering penetration test, and how to counter social engineering attacks. Finally, examine the role played by human behavior in penetration testing.  

WHAT YOU WILL LEARN

  • discover the key concepts covered in this course
    identify penetration testing types and describe their reliance on end-user behavior
    describe the limitations of penetration testing and challenges for organizations
    identify the role of human error in causing data breaches
    describe the role of end-user awareness in preventing cybersecurity attacks and during penetration testing
    describe user behavior analytics and why it is important during penetration testing
    identify tools for performing user behavior analytics
  • identify how to translate penetration testing results into a formalized report that can be used for the end-user awareness program
    recognize social engineering attacks and how to they relate to penetration testing
    describe how to perform social engineering penetration testing
    describe the goals of social engineering penetration tests
    describe tips and tricks for preventing social engineering attacks
    describe the role of human behavior in penetration testing
    summarize the key concepts covered in this course

IN THIS COURSE

  • Playable
    1. 
    Course Overview
    1m 39s
    UP NEXT
  • Playable
    2. 
    Penetration Testing Types
    9m 27s
  • Locked
    3. 
    Penetration Testing Weaknesses
    9m 31s
  • Locked
    4. 
    Human Error Data Breaches
    9m 25s
  • Locked
    5. 
    End-user Awareness
    8m 20s
  • Locked
    6. 
    User Behavior Analytics
    7m 13s
  • Locked
    7. 
    User Behavior Analytics Tools
    6m 29s
  • Locked
    8. 
    Penetration Testing Report
    8m 38s
  • Locked
    9. 
    Social Engineering Attacks
    8m 22s
  • Locked
    10. 
    Social Engineering Pen Testing
    11m 34s
  • Locked
    11. 
    Social Engineering Goals
    6m 12s
  • Locked
    12. 
    Social Engineering Countermeasures
    8m 32s
  • Locked
    13. 
    Human Behavior Penetration Testing
    10m 34s
  • Locked
    14. 
    Course Summary
    1m 6s

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion of this course, which can be shared on any social network or business platform

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE

Likes 30 Likes 30  
Likes 1 Likes 1  

PEOPLE WHO VIEWED THIS ALSO VIEWED THESE

Likes 91 Likes 91  
Likes 132 Likes 132  
Likes 224 Likes 224