CISM 2022: Common Network Security Attacks
CISM
| Intermediate
- 9 videos | 49m 50s
- Includes Assessment
- Earns a Badge
Security technicians can benefit significantly by executing network security attacks in a controlled environment. This allows for an in-depth periodic review of security control efficacy related to IT networks. In this course, you will discover how networks can be scanned by attackers seeking potentially vulnerable services using free tools such as Nmap. You will then explore how attackers can compromise a user web browser, how SQL injection attacks can reveal more information than intended by the app designer, and how to configure a reverse shell where the compromised station reaches out to the attacker station, often defeating standard firewall rule sets. Next, you will learn how to spoof network traffic and execute a distributed denial-of-service (DDoS) attack. Lastly, you will discover how to brute force a Windows remote desktop protocol (RDP) connection to gain access to a Windows host. This course can be used to prepare for the Certified Information Security Manager (CISM) exam.
WHAT YOU WILL LEARN
-
Discover the key concepts covered in this courseScan a network using nmap to determine which devices are presentUse the browser exploitation framework (beef) tool to hack a web browserRun a sql injection attackRecall how reverse shells works and how to mitigate this risk
-
Use hping3 to forge network trafficRun a distributed denial-of-service (ddos) attack against a websiteUse the hydra tool to brute force a windows remote desktop protocol (rdp) connectionSummarize the key concepts covered in this course
IN THIS COURSE
-
1m 15sIn this video, we will discover the key concepts covered in this course. FREE ACCESS
-
8m 4sLearn how to scan a network using Nmap to determine which devices are present. FREE ACCESS
-
9m 7sFind out how to use the Browser Exploitation Framework (BeEF) tool to hack a web browser. FREE ACCESS
-
5m 28sDiscover how to run a SQL injection attack. FREE ACCESS
-
6m 41sIn this video, find out how to recall how reverse shells works and how to mitigate this risk. FREE ACCESS
-
5m 50sDuring this video, you will learn how to use hping3 to forge network traffic. FREE ACCESS
-
5m 32sIn this video, find out how to run a distributed denial-of-service (DDoS) attack against a website. FREE ACCESS
-
6m 56sDiscover how to use the Hydra tool to brute force a Windows remote desktop protocol (RDP) connection. FREE ACCESS
-
58sIn this video, we will summarize the key concepts covered in this course. FREE ACCESS
EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE
Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.
Digital badges are yours to keep, forever.