SECOPS: ICMP Intrusion Part 2
2 Videos | 52m 52s
- Includes Assessment
- Earns a Badge
Examine additional ICMP security considerations by exploring attacks like firewalking, OS fingerprinting, ICMP route redirects, router discovery spoofing, and Denial of Service. This course can be used as part of the preparation for the 210-255: Implementing Cisco Cybersecurity Operations certification exam.
WHAT YOU WILL LEARN
describe the characteristics of ICMP traffic for Windows and Linuxdescribe the ICMP type used by host unreachable messagesidentify ICMP data used in OS fingerprintingidentify the ICMP type for echo request messages
identify the layer of the OSI model that ICMP operates atdefine how MITM attacks work with ICMPv6describe how to obtain a reverse shell with ICMPdescribe the ICMPv6 packets used to locate routers
EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE
Skillsoft is providing you the opportunity to earn a digital badge upon successful completion of this course, which can be shared on any social network or business platformDigital badges are yours to keep, forever.