SecOps Tools and 2021 Security Incidents: Colonial Pipeline

Cybersecurity    |    Intermediate
  • 14 Videos | 1h 15m 11s
  • Includes Assessment
  • Earns a Badge
Cybersecurity professionals often will be tasked with studying breaches that have impacted other organizations to protect their own assets. This knowledge helps to identify potential threats and understand how threat actors are operating in a modern environment. Begin this course by exploring the background of the Colonial Pipeline breach and how it was discovered. Then, examine how the data breach happened, focusing on credential harvesting methods typically used to capture login data. Next, investigate the different tools that could be used to conduct a similar type of attack, including Maltego CE, theHarvester, the Social-Engineer Toolkit and Zphisher. Finally, take a look at the cybersecurity community response and cybersecurity implications resulting from the Colonial Pipeline incident. Once you have completed this course, you will be able to use tools to conduct an attack similar to the Colonial Pipeline breach and identify potential threats to other organizations.

WHAT YOU WILL LEARN

  • discover the key concepts covered in this course
    outline the basic background of the attack and what made it possible
    outline how the attack was discovered and disclosed
    describe the operation of the DarkSide ransomware group
    describe how to gather information from potential targets
    harvest login credentials from the web
    identify tools that can be used for phishing and gathering open-source intelligence (OSINT)
  • gather open-source intelligence using Maltego Community Edition (Maltego CE)
    gather open-source intelligence using theHarvester
    conduct a phishing attack using the Social-Engineer Toolkit (SET)
    conduct a phishing attack using the Zphisher phishing tool
    describe Colonial Pipeline's response to the ransomware event
    describe the political and cybersecurity fallout resulting from the ransomware event
    summarize the key concepts covered in this course

IN THIS COURSE

  • Playable
    1. 
    Course Overview
    1m 9s
    UP NEXT
  • Playable
    2. 
    Background of the Colonial Pipeline Breach
    8m 27s
  • Locked
    3. 
    Colonial Pipeline Breach Discovery
    6m 15s
  • Locked
    4. 
    DarkSide Ransomware
    6m 35s
  • Locked
    5. 
    Intelligence Gathering
    6m 48s
  • Locked
    6. 
    Credential Harvesting
    6m 55s
  • Locked
    7. 
    Identifying Phishing and OSINT Tools
    4m 13s
  • Locked
    8. 
    Gathering OSINT Using Maltego CE
    6m 14s
  • Locked
    9. 
    Gathering OSINT Using theHarvester
    4m 10s
  • Locked
    10. 
    Conducting a Phishing Attack Using SET
    5m 28s
  • Locked
    11. 
    Conducting a Phishing Attack Using Zphisher
    4m 27s
  • Locked
    12. 
    Colonial Pipeline Response
    7m 29s
  • Locked
    13. 
    Colonial Pipeline Fallout
    5m 58s
  • Locked
    14. 
    Course Summary
    1m 3s

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion of this course, which can be shared on any social network or business platform

Digital badges are yours to keep, forever.