CISM 2022: Common Network Security Attacks

CISM    |    Intermediate
  • 9 videos | 49m 50s
  • Includes Assessment
  • Earns a Badge
Rating 4.8 of 4 users Rating 4.8 of 4 users (4)
Security technicians can benefit significantly by executing network security attacks in a controlled environment. This allows for an in-depth periodic review of security control efficacy related to IT networks. In this course, you will discover how networks can be scanned by attackers seeking potentially vulnerable services using free tools such as Nmap. You will then explore how attackers can compromise a user web browser, how SQL injection attacks can reveal more information than intended by the app designer, and how to configure a reverse shell where the compromised station reaches out to the attacker station, often defeating standard firewall rule sets. Next, you will learn how to spoof network traffic and execute a distributed denial-of-service (DDoS) attack. Lastly, you will discover how to brute force a Windows remote desktop protocol (RDP) connection to gain access to a Windows host. This course can be used to prepare for the Certified Information Security Manager (CISM) exam.

WHAT YOU WILL LEARN

  • Discover the key concepts covered in this course
    Scan a network using nmap to determine which devices are present
    Use the browser exploitation framework (beef) tool to hack a web browser
    Run a sql injection attack
    Recall how reverse shells works and how to mitigate this risk
  • Use hping3 to forge network traffic
    Run a distributed denial-of-service (ddos) attack against a website
    Use the hydra tool to brute force a windows remote desktop protocol (rdp) connection
    Summarize the key concepts covered in this course

IN THIS COURSE

  • 1m 15s
    In this video, we will discover the key concepts covered in this course. FREE ACCESS
  • 8m 4s
    Learn how to scan a network using Nmap to determine which devices are present. FREE ACCESS
  • Locked
    3.  Compromising a Web Browser
    9m 7s
    Find out how to use the Browser Exploitation Framework (BeEF) tool to hack a web browser. FREE ACCESS
  • Locked
    4.  Executing a SQL Injection Attack
    5m 28s
    Discover how to run a SQL injection attack. FREE ACCESS
  • Locked
    5.  Configuring a Reverse Shell
    6m 41s
    In this video, find out how to recall how reverse shells works and how to mitigate this risk. FREE ACCESS
  • Locked
    6.  Spoofing Network Traffic
    5m 50s
    During this video, you will learn how to use hping3 to forge network traffic. FREE ACCESS
  • Locked
    7.  Executing a Distributed Denial-of-service (DDoS) Attack
    5m 32s
    In this video, find out how to run a distributed denial-of-service (DDoS) attack against a website. FREE ACCESS
  • Locked
    8.  Brute Forcing Remote Desktop Protocol (RDP) Connections
    6m 56s
    Discover how to use the Hydra tool to brute force a Windows remote desktop protocol (RDP) connection. FREE ACCESS
  • Locked
    9.  Course Summary
    58s
    In this video, we will summarize the key concepts covered in this course. FREE ACCESS

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE

Rating 4.6 of 21 users Rating 4.6 of 21 users (21)
Rating 4.7 of 16 users Rating 4.7 of 16 users (16)
Rating 5.0 of 4 users Rating 5.0 of 4 users (4)

PEOPLE WHO VIEWED THIS ALSO VIEWED THESE

Rating 4.7 of 9 users Rating 4.7 of 9 users (9)
Rating 4.5 of 12 users Rating 4.5 of 12 users (12)
Rating 4.6 of 54 users Rating 4.6 of 54 users (54)