CompTIA Cybersecurity Analyst+: Attack Types
Cybersecurity Analyst+
| Intermediate
- 21 videos | 1h 51m 30s
- Includes Assessment
- Earns a Badge
Helping protect your company's valuable assets against malicious attacks by outsiders requires a seasoned understanding of modern-day cyber threats. This 21-video course prepares learners to thwart reconnaissance and surveillance attacks by hackers and ward off Wi-Fi vulnerabilities, by using the proper tools. First, examine the wide variety of possible modes of attack-from injection, overflow, and cross-site scripting to XML (extensible markup language), DoS, address resolution protocol (ARP) poisoning, and password compromises. Then develop valuable skills in counteracting web browser compromises and agility in the use of Kali Linux Wi-Fi tools. Learn OWASP's (Open Web Application Security Project) Top 10 vulnerabilities and ESAPI (Enterprise Security application programming interface) tools for each one, such as ZAP (Zed Attack Proxy), to test web application security. While you're learning, pause to meet the aptly-named John the Ripper, a free tool for cracking passwords on 15 platforms! The course helps to prepare learners for CompTIA+ Cybersecurity Analyst+ (CySA+) CS0-002 certification exam.
WHAT YOU WILL LEARN
-
Discover the key concepts covered in this courseRecognize how information gathering is the first step in hackingUse the metasploit framework to generate e-mail listsList common wi-fi network vulnerabilities and mitigation strategiesDescribe common wi-fi attack techniquesUse kali linux wi-fi toolsHarden a wi-fi routerRecognize how injection attacks can lead to sensitive data disclosureRecall how overflow attacks workList different types of cross-site scripting attacksUse the beef tool to hack a web browser
-
Describe how the use of insecure xml components can lead to web application compromiseList common web application vulnerabilitiesUse the owasp zap tool to test web application securityUse the slowhttptest command to run a dos attack against an http web siteDescribe arp poisoning attacksUse kali linux to execute an arp poisoning mitm attackRecognize how malicious users use a variety of password attacks to compromise user accountsUse the hydra tool to brute force a windows rdp connectionUse john the ripper to crack user passwordsSummarize the key concepts covered in this course
IN THIS COURSE
-
2m 20s
-
4m 37sAfter completing this video, you will be able to recognize that information gathering is the first step in hacking. FREE ACCESS
-
2m 39sIn this video, you will learn how to use the Metasploit Framework to generate email lists. FREE ACCESS
-
6m 4sAfter completing this video, you will be able to list common Wi-Fi network vulnerabilities and mitigation strategies. FREE ACCESS
-
5m 20sAfter completing this video, you will be able to describe common Wi-Fi attack techniques. FREE ACCESS
-
2m 47sLearn how to use Kali Linux's Wi-Fi tools. FREE ACCESS
-
5m 18sIn this video, you will harden a Wi-Fi router. FREE ACCESS
-
8m 40sAfter completing this video, you will be able to recognize how injection attacks can lead to the disclosure of sensitive data. FREE ACCESS
-
7m 33sAfter completing this video, you will be able to recall how overflow attacks work. FREE ACCESS
-
5m 51sUpon completion of this video, you will be able to list different types of cross-site scripting attacks. FREE ACCESS
-
10m 3sIn this video, you will learn how to use the BeEF tool to exploit a web browser. FREE ACCESS
-
3m 56sAfter completing this video, you will be able to describe how the use of insecure XML components can lead to web application compromise. FREE ACCESS
-
8m 44sAfter completing this video, you will be able to list common web application vulnerabilities. FREE ACCESS
-
5m 38sIn this video, you will learn how to use the OWASP ZAP tool to test web application security. FREE ACCESS
-
5m 8sIn this video, you will use the slowhttptest command to run a denial of service attack against an HTTP web site. FREE ACCESS
-
5m 25sAfter completing this video, you will be able to describe ARP poisoning attacks. FREE ACCESS
-
6m 59sIn this video, learn how to use Kali Linux to execute an ARP poisoning man-in-the-middle attack. FREE ACCESS
-
6m 40sAfter completing this video, you will be able to recognize how malicious users use a variety of password attacks to compromise user accounts. FREE ACCESS
-
3m 4sIn this video, learn how to use the hydra tool to brute force a Windows RDP connection. FREE ACCESS
-
3m 26sFind out how to use John the Ripper to crack passwords. FREE ACCESS
-
1m 17s
EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE
Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.
Digital badges are yours to keep, forever.