Vulnerabilities and Exploits
- 12 videos | 50m 39s
- Includes Assessment
- Earns a Badge
Discover how common threat sources actually get exploited, in the world of web security. During this course, you will learn about white hat hackers, social engineers, phishing, social engineering attempts, exploit kits, ransomware, state sponsored hacking, and bug bounties. See how web-based applications have become more popular and what popularity means for data security. Look at Web Application Firewalls (WAFs), and how they protect web applications. Identify disaster recovery terms, such as BCP, DRP, RTO, and RPO. As a review exercise, you will describe how malicious users use tools to exploit vulnerabilities.
WHAT YOU WILL LEARN
describe what white hat hackers are and how they can help ameliorate the security of a business or productdescribe what social engineering is and why it can be so dangerousspecify how phishing can affect the security of a businessrecognize deceptive e-mail messagesdescribe how exploit kits can be used to take advantage of vulnerabilities in operating systems and applicationsdefine ransomware attacks and how they can affect sensitive data
describe how the influence of governments in hacking incidents has become a large issue for IT securityspecify how bug bounties can help result in more exploits being found and fixeddescribe how web-based applications have gained more popularity and what implications for data security they havedescribe how WAFs can protect web applicationslist and define disaster recovery terms such as BCP, DRP, RTO, and RPOdsecribe how malicious users use tools to exploit vulnerabilities
IN THIS COURSE
EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE
Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.Digital badges are yours to keep, forever.
YOU MIGHT ALSO LIKE
PEOPLE WHO VIEWED THIS ALSO VIEWED THESE
Course Attack Vectors & Mitigations