SecOps Tools and 2021 Security Incidents: JBS Ransomware Attack

Cybersecurity    |    Intermediate
  • 12 Videos | 1h 1m 19s
  • Includes Assessment
  • Earns a Badge
Cybersecurity professionals often will be tasked with studying breaches that have impacted other organizations. This knowledge helps to identify potential threats and understand how threat actors are operating in a modern environment. Explore the background of the JBS ransomware attack and how it was discovered. Then, investigate how the breach happened and examine various vulnerability scanning and exfiltration tools that could be used to conduct this type of attack. Finally, take a look at the cybersecurity community response to the breach and the fallout for JBS Foods from the event. Once you have completed this course you should be familiar with the background of the JBS ransomware attack, how to use tools to conduct a similar type of attack, and how JBS Foods and the Government responded to the breach.

WHAT YOU WILL LEARN

  • discover the key concepts covered in this course
    describe the background of the attack and what made it possible
    describe how the attack was discovered and disclosed
    describe the operation of the REvil ransomware group
    recognize tools that can scan for vulnerabilities
    scan for potential targets using the Fierce scanner
  • scan for a vulnerabilities using the Nmap utility
    scan for known vulnerabilities using Metasploit penetration testing software
    exfiltrate sensitive data from a compromised server using netcat and telnet
    describe how JBS recovered from the ransomware event
    describe the political and cybersecurity fallout resulting from the ransomware event
    summarize the key concepts covered in this course

IN THIS COURSE

  • Playable
    1. 
    Course Overview
    1m 11s
    UP NEXT
  • Playable
    2. 
    Background of the JBS Ransomware Attack
    6m 48s
  • Locked
    3. 
    Attack Discovery
    5m 6s
  • Locked
    4. 
    REvil Ransomware
    4m 59s
  • Locked
    5. 
    Vulnerability Scanning and Data Exfiltration Tools
    7m 6s
  • Locked
    6. 
    Scanning Domains Using Fierce
    6m 31s
  • Locked
    7. 
    Scanning for Vulnerabilities Using Nmap
    6m 39s
  • Locked
    8. 
    Scanning for Vulnerabilities Using Metasploit
    5m 44s
  • Locked
    9. 
    Exfiltrating Data From a Compromised Server
    3m 44s
  • Locked
    10. 
    JBS Ransomware Attack Recovery
    5m 36s
  • Locked
    11. 
    JBS Ransomware Attack Fallout
    7m 6s
  • Locked
    12. 
    Course Summary
    50s

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion of this course, which can be shared on any social network or business platform

Digital badges are yours to keep, forever.