Security Assessment Using Software Tools
Intermediate
- 15 Videos | 47m 28s
- Includes Assessment
- Earns a Badge
There is a saying that a craftsman is only as good as his tools. Explore some of the various tools available for security assessment, including several demonstrations of how to use them.
WHAT YOU WILL LEARN
-
work with protocol analyzerswork with network scannersspecify wireless scanners/crackerwork with password crackersdescribe vulnerability scannersdefine configuration compliance scannerdescribe exploitation frameworkscompare data sanitization tools
-
define steganography toolsdescribe honeypotsconfigure backup utilitiesdefine banner grabbingcompare passive vs. activedescribe other command line toolswork with security assessment using software tools
IN THIS COURSE
-
1.Protocol Analyzers4m 33sUP NEXT
-
2.Network Scanners2m 1s
-
3.Wireless Scanners/Cracker2m 33s
-
4.Password Crackers6m 46s
-
5.Vulnerability Scanners2m 55s
-
6.Configuration Compliance Scanner2m 58s
-
7.Exploitation Frameworks2m 25s
-
8.Data Sanitization Tools4m 15s
-
9.Steganography Tools1m 19s
-
10.Honeypots3m 3s
-
11.Backup Utilities3m 12s
-
12.Banner Grabbing3m 48s
-
13.Passive vs. Active2m 18s
-
14.Other Command Line Tools2m 55s
-
15.Exercise: Use Security Assessment Tools2m 28s
EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE
Skillsoft is providing you the opportunity to earn a digital badge upon successful completion of this course, which can be shared on any social network or business platform
Digital badges are yours to keep, forever.