SECFND: Attack & Evasion
2 Videos | 53m 17s
- Includes Assessment
- Earns a Badge
Discover how attackers target your networks and evasion methods they may use. Buffer overflow, malware, port scanning, host profiling, encryption and tunneling, resource exhaustion, traffic fragmentation, and pivot attacks are covered. This course can be used as part of the preparation for the 210-250: Understanding Cisco Cybersecurity Fundamentals certification exam.
WHAT YOU WILL LEARN
identify common buffer overflow attacksidentify the best practice for fixing root kit attacksidentify the objective of port scanningidentify what is tracked during a host profiling attackidentify what occurs during a buffer overflow attack
identify examples of evasion methodsidentify how malware gets installed on a deviceidentify methods to troubleshoot an evasion attackidentify technology for evading firewalls
EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE
Skillsoft is providing you the opportunity to earn a digital badge upon successful completion of this course, which can be shared on any social network or business platformDigital badges are yours to keep, forever.