CompTIA Cybersecurity Analyst+: Network Scanning & Traffic Analysis

Cybersecurity Analyst+    |    Intermediate
  • 13 videos | 1h 59s
  • Includes Assessment
  • Earns a Badge
Rating 4.6 of 41 users Rating 4.6 of 41 users (41)
Discover how vulnerability scanning can detect weaknesses while pen testing exploits weaknesses. Explore these activities along with how intrusion detection and prevention help secure networks, hosts, apps and data for organizations. This course can be used in preparation for the CompTIA Cybersecurity Analyst (CySA+) Certification Exam CS0-002.

WHAT YOU WILL LEARN

  • Discover the key concepts covered in this course
    Recognize how vulnerability scanning identifies security weaknesses
    Recognize how pen testing identifies and exploits security weaknesses
    Recognize how metasploit fits into penetration testing
    Explore the metasploit framework
    Download and install an exploitable vm
    Use a variety of metasploit scanning and exploit techniques
  • Run an nmap network scan
    Compare baseline and current scans to identify changes
    Run a nessus vulnerability scan
    View vulnerability scan results
    Use the hping tool to generate network syn flood traffic
    Summarize the key concepts covered in this course

IN THIS COURSE

  • 1m 59s
  • 5m 38s
    Upon completion of this video, you will be able to recognize how vulnerability scanning identifies security weaknesses. FREE ACCESS
  • Locked
    3.  Penetration Testing
    5m 3s
    After completing this video, you will be able to recognize how pen testing identifies and exploits security weaknesses. FREE ACCESS
  • Locked
    4.  Metasploit Overview
    3m 49s
    After completing this video, you will be able to recognize how Metasploit fits into penetration testing. FREE ACCESS
  • Locked
    5.  Explore Metasploit
    5m 19s
    Learn how to use the Metasploit Framework. FREE ACCESS
  • Locked
    6.  Metasploitable
    2m 39s
    In this video, find out how to download and install a VM that can be exploited. FREE ACCESS
  • Locked
    7.  Metasploit Scanning and Exploits
    9m 13s
    In this video, find out how to use a variety of metasploit scanning and exploitation techniques. FREE ACCESS
  • Locked
    8.  Nmap Network Scan
    9m 23s
    During this video, you will learn how to run a Nmap network scan. FREE ACCESS
  • Locked
    9.  Network Scan Comparisons
    4m 3s
    In this video, you will learn how to compare baseline and current scans to identify changes. FREE ACCESS
  • Locked
    10.  Nessus Vulnerability Scan
    5m 15s
    During this video, you will learn how to run a Nessus scan. FREE ACCESS
  • Locked
    11.  Greenbone Security Manager Vulnerability Scan
    4m 13s
    This video will show you how to view the results of a vulnerability scan. FREE ACCESS
  • Locked
    12.  Hping Packet Generation
    3m 12s
    In this video, you will use the hping tool to generate network traffic that will cause a SYN flood. FREE ACCESS
  • Locked
    13.  Course Summary
    1m 13s

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE

Rating 5.0 of 2 users Rating 5.0 of 2 users (2)
Rating 5.0 of 1 users Rating 5.0 of 1 users (1)
Rating 5.0 of 2 users Rating 5.0 of 2 users (2)

PEOPLE WHO VIEWED THIS ALSO VIEWED THESE

Rating 4.4 of 94 users Rating 4.4 of 94 users (94)
Rating 4.6 of 242 users Rating 4.6 of 242 users (242)
Rating 4.5 of 120 users Rating 4.5 of 120 users (120)