SecOps Tools and 2021 Security Incidents: Colonial Pipeline

Cybersecurity    |    Intermediate
  • 14 videos | 1h 15m 11s
  • Includes Assessment
  • Earns a Badge
Rating 4.3 of 7 users Rating 4.3 of 7 users (7)
Cybersecurity professionals often will be tasked with studying breaches that have impacted other organizations to protect their own assets. This knowledge helps to identify potential threats and understand how threat actors are operating in a modern environment. Begin this course by exploring the background of the Colonial Pipeline breach and how it was discovered. Then, examine how the data breach happened, focusing on credential harvesting methods typically used to capture login data. Next, investigate the different tools that could be used to conduct a similar type of attack, including Maltego CE, theHarvester, the Social-Engineer Toolkit and Zphisher. Finally, take a look at the cybersecurity community response and cybersecurity implications resulting from the Colonial Pipeline incident. Once you have completed this course, you will be able to use tools to conduct an attack similar to the Colonial Pipeline breach and identify potential threats to other organizations.

WHAT YOU WILL LEARN

  • Discover the key concepts covered in this course
    Outline the basic background of the attack and what made it possible
    Outline how the attack was discovered and disclosed
    Describe the operation of the darkside ransomware group
    Describe how to gather information from potential targets
    Harvest login credentials from the web
    Identify tools that can be used for phishing and gathering open-source intelligence (osint)
  • Gather open-source intelligence using maltego community edition (maltego ce)
    Gather open-source intelligence using theharvester
    Conduct a phishing attack using the social-engineer toolkit (set)
    Conduct a phishing attack using the zphisher phishing tool
    Describe colonial pipeline's response to the ransomware event
    Describe the political and cybersecurity fallout resulting from the ransomware event
    Summarize the key concepts covered in this course

IN THIS COURSE

  • 1m 9s
  • 8m 27s
    Background of the Attack FREE ACCESS
  • Locked
    3.  Colonial Pipeline Breach Discovery
    6m 15s
    Attack Discovery FREE ACCESS
  • Locked
    4.  DarkSide Ransomware
    6m 35s
    DarkSide Ransomware FREE ACCESS
  • Locked
    5.  Intelligence Gathering
    6m 48s
    Intelligence Gathering FREE ACCESS
  • Locked
    6.  Credential Harvesting
    6m 55s
    Credential Harvesting FREE ACCESS
  • Locked
    7.  Identifying Phishing and OSINT Tools
    4m 13s
    Phishing & OSINT Tools FREE ACCESS
  • Locked
    8.  Gathering OSINT Using Maltego CE
    6m 14s
    Gathering OSINT Using Maltego CE FREE ACCESS
  • Locked
    9.  Gathering OSINT Using theHarvester
    4m 10s
    Gathering OSINT Using theHarvester FREE ACCESS
  • Locked
    10.  Conducting a Phishing Attack Using SET
    5m 28s
    Conducting a Phishing Attack Using SET FREE ACCESS
  • Locked
    11.  Conducting a Phishing Attack Using Zphisher
    4m 27s
    Conducting a Phishing Attack Using Zphisher FREE ACCESS
  • Locked
    12.  Colonial Pipeline Response
    7m 29s
    Colonial Pipeline Response FREE ACCESS
  • Locked
    13.  Colonial Pipeline Fallout
    5m 58s
    Colonial Pipeline Fallout FREE ACCESS
  • Locked
    14.  Course Summary
    1m 3s

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE

Rating 4.6 of 30 users Rating 4.6 of 30 users (30)
Rating 4.9 of 13 users Rating 4.9 of 13 users (13)
Rating 4.6 of 123 users Rating 4.6 of 123 users (123)