Security Vulnerabilities: Managing Threats & Vulnerabilities

Beginner
  • 14 videos | 52m 56s
  • Includes Assessment
  • Earns a Badge
Rating 4.6 of 63 users Rating 4.6 of 63 users (63)
This 14-video course helps learners explore the threat categories in the STRIDE (Spoofing, Tampering, Repudiation, Information Disclosure, Denial of Service, and Elevation of Privilege) model for identifying computer security threats, including spoofing, tampering, repudiation, information disclosure, denial of service (DoS), and escalation of privilege. Key concepts covered in this course include categories of security vulnerabilities using the STRIDE model; how to recognize authenticity and identity spoofing threats; and how to validate integrity and tampering threats. Next, you will learn about authentication threats and non-repudiation, when used in security, for example, when a charge cannot be challenged; learn information threats such as privacy breaches or data leaks; and learn the threat of DoS attacks, a resource disruption attack when a user tries to connect. Learners continue by exploring the privilege escalation threat model; learning to recognize examples of security misconfiguration threats; and observing methods of brute force attacks and key sizes. Finally, learn to perform a local network scan and a targeted remote scan by using Nmap; and learn to perform a DoS vulnerability diagnostic test on a host.

WHAT YOU WILL LEARN

  • Discover the key concepts covered in this course
    Describe the categories of vulnerabilities using the stride model
    Describe authenticity and identity spoofing threats
    Describe how to validate integrity and tampering threats
    Describe authentication threats and non-repudiation
    Describe information threats such as privacy breaches or data leaks
    Describe the threat of denial of service attacks
  • Describe the privilege escalation threat model
    Recognize examples of security misconfiguration threats
    Describe methods of brute force attacks and key sizes
    Perform a local network scan using nmap
    Perform a targeted remote scan using nmap
    Perform a dos vulnerability diagnostic test on a host
    Summarize the key concepts covered in this course

IN THIS COURSE

  • 1m 22s
  • 4m 5s
    Upon completion of this video, you will be able to describe the categories of vulnerabilities using the STRIDE model. FREE ACCESS
  • Locked
    3.  User Identity Spoofing
    5m 45s
    After completing this video, you will be able to describe authenticity and identity spoofing threats. FREE ACCESS
  • Locked
    4.  Integrity and Tampering Threats
    4m 54s
    After completing this video, you will be able to describe how to validate integrity and tampering threats. FREE ACCESS
  • Locked
    5.  Authentication and Non-repudiation
    3m 56s
    After completing this video, you will be able to describe authentication threats and non-repudiation. FREE ACCESS
  • Locked
    6.  Information Privacy and Confidentiality
    4m 14s
    After completing this video, you will be able to describe information threats such as privacy breaches or data leaks. FREE ACCESS
  • Locked
    7.  Denial of Service
    3m 41s
    After watching this video, you will be able to describe the threat of denial of service attacks. FREE ACCESS
  • Locked
    8.  Escalation of Privilege
    3m 22s
    Upon completion of this video, you will be able to describe the threat model for privilege escalation. FREE ACCESS
  • Locked
    9.  Security Misconfiguration
    3m 17s
    After completing this video, you will be able to recognize examples of security misconfiguration threats. FREE ACCESS
  • Locked
    10.  Brute Force Attacks
    3m 40s
    After completing this video, you will be able to describe methods of brute force attacks and key sizes. FREE ACCESS
  • Locked
    11.  Basic Local Scans
    4m 52s
    In this video, find out how to scan your local network using Nmap. FREE ACCESS
  • Locked
    12.  Remotely Scanning a Target
    4m 22s
    In this video, you will learn how to perform a targeted remote scan using Nmap. FREE ACCESS
  • Locked
    13.  Vulnerability Diagnostics
    4m 28s
    In this video, you will learn how to perform a diagnostic test for vulnerabilities to a DOS attack on a host. FREE ACCESS
  • Locked
    14.  Course Summary
    57s

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE

Rating 4.6 of 123 users Rating 4.6 of 123 users (123)
Rating 4.6 of 30 users Rating 4.6 of 30 users (30)
Rating 4.6 of 215 users Rating 4.6 of 215 users (215)

PEOPLE WHO VIEWED THIS ALSO VIEWED THESE

Rating 4.4 of 13 users Rating 4.4 of 13 users (13)
Rating 4.3 of 129 users Rating 4.3 of 129 users (129)
Rating 4.4 of 332 users Rating 4.4 of 332 users (332)