SecOps Tools and 2021 Security Incidents: Facebook Data Breach

Cybersecurity    |    Intermediate
  • 11 videos | 54m 9s
  • Includes Assessment
  • Earns a Badge
Rating 4.3 of 4 users Rating 4.3 of 4 users (4)
Cybersecurity professionals will often be tasked with studying breaches that have impacted other organizations to protect their own assets. This knowledge helps in identifying potential threats and understanding how threat actors operate in a modern environment. Begin this course by exploring the background of the Facebook data breach and how it was initially discovered. Then, explore how the data breach happened, and the method used to capture the data. Next, explore different tools that could be used to conduct a similar type of attack. Finally, examine the cybersecurity community's response to the breach and the fallout for Facebook from the event. On completing this course, you will have a better understanding of the Facebook data breach, how to conduct a similar attack, and how such a cybersecurity event can impact an organization.

WHAT YOU WILL LEARN

  • Discover the key concepts covered in this course
    Describe the background of the facebook data breach and its overall impact
    Outline how the facebook data breach was discovered
    Explain how the contact importer tool made the data breach possible
    Describe some of the brute forcing tools that could be used to conduct a password attack
    Build a list of phone numbers using a crunch list generator
  • Create and run a web scraper written in python
    Create a phishing site to steal login credentials from a test user
    Explain how facebook and the cybersecurity community responded to the data breach
    Outline the repercussions of the data breach for both users and facebook
    Summarize the key concepts covered in this course

IN THIS COURSE

  • 45s
  • 9m 4s
  • Locked
    3.  How the Data Breach Was Discovered
    5m 22s
  • Locked
    4.  The Role of the Contact Importer Flaw
    5m 4s
  • Locked
    5.  The Use of Brute Forcing Tools
    7m 8s
  • Locked
    6.  Generating a Phone List Using Crunch
    3m 3s
  • Locked
    7.  Creating and Running a Web Scraper
    7m 44s
  • Locked
    8.  Phishing for Facebook Login Credentials
    4m 59s
  • Locked
    9.  Response: Facebook and the Cybersecurity Community
    5m 46s
  • Locked
    10.  Fallout from the Data Breach
    4m 17s
  • Locked
    11.  Course Summary
    57s

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE

Rating 4.3 of 3 users Rating 4.3 of 3 users (3)
Rating 4.5 of 4 users Rating 4.5 of 4 users (4)
Rating 5.0 of 2 users Rating 5.0 of 2 users (2)

PEOPLE WHO VIEWED THIS ALSO VIEWED THESE

Rating 4.6 of 155 users Rating 4.6 of 155 users (155)
Rating 4.5 of 12 users Rating 4.5 of 12 users (12)
Rating 4.0 of 4 users Rating 4.0 of 4 users (4)