Security Vulnerabilities: Managing Threats & Vulnerabilities
Beginner
- 14 Videos | 52m 56s
- Includes Assessment
- Earns a Badge
This 14-video course helps learners explore the threat categories in the STRIDE (Spoofing, Tampering, Repudiation, Information Disclosure, Denial of Service, and Elevation of Privilege) model for identifying computer security threats, including spoofing, tampering, repudiation, information disclosure, denial of service (DoS), and escalation of privilege. Key concepts covered in this course include categories of security vulnerabilities using the STRIDE model; how to recognize authenticity and identity spoofing threats; and how to validate integrity and tampering threats. Next, you will learn about authentication threats and non-repudiation, when used in security, for example, when a charge cannot be challenged; learn information threats such as privacy breaches or data leaks; and learn the threat of DoS attacks, a resource disruption attack when a user tries to connect. Learners continue by exploring the privilege escalation threat model; learning to recognize examples of security misconfiguration threats; and observing methods of brute force attacks and key sizes. Finally, learn to perform a local network scan and a targeted remote scan by using Nmap; and learn to perform a DoS vulnerability diagnostic test on a host.
WHAT YOU WILL LEARN
-
discover the key concepts covered in this coursedescribe the categories of vulnerabilities using the STRIDE modeldescribe authenticity and identity spoofing threatsdescribe how to validate integrity and tampering threatsdescribe authentication threats and non-repudiationdescribe information threats such as privacy breaches or data leaksdescribe the threat of denial of service attacks
-
describe the privilege escalation threat modelrecognize examples of security misconfiguration threatsdescribe methods of brute force attacks and key sizesperform a local network scan using Nmapperform a targeted remote scan using Nmapperform a DOS vulnerability diagnostic test on a hostsummarize the key concepts covered in this course
IN THIS COURSE
-
1.Course Overview1m 22sUP NEXT
-
2.STRIDE Model of Threats4m 5s
-
3.User Identity Spoofing5m 45s
-
4.Integrity and Tampering Threats4m 54s
-
5.Authentication and Non-repudiation3m 56s
-
6.Information Privacy and Confidentiality4m 14s
-
7.Denial of Service3m 41s
-
8.Escalation of Privilege3m 22s
-
9.Security Misconfiguration3m 17s
-
10.Brute Force Attacks3m 40s
-
11.Basic Local Scans4m 52s
-
12.Remotely Scanning a Target4m 22s
-
13.Vulnerability Diagnostics4m 28s
-
14.Course Summary57s
EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE
Skillsoft is providing you the opportunity to earn a digital badge upon successful completion of this course, which can be shared on any social network or business platform
Digital badges are yours to keep, forever.