CompTIA Cybersecurity Analyst+: Exploits & Security Practices
Cyber Security
| Intermediate
- 14 videos | 1h 1m 16s
- Includes Assessment
- Earns a Badge
Exploits take form not only as technical entities, but also as employee workplace violations. Explore common exploits, including spoofing, packet forgery, and rootkits, and discover best practices for prevention.
WHAT YOU WILL LEARN
-
Recognize proper hiring practicesProvision new user accounts in accordance with organizational security policiesApply personnel management best practicesDistinguish the difference between threats, vulnerabilities, and exploitsExplain the concept of spoofingCraft forged packets using free toolsRecognize how impersonation can be used to gain unauthorized access
-
Recognize css attacksRecognize root kitsExplain the concept of privilege escalationDistinguish the difference between common exploit toolsUse metasploit tools to further understand the attacker toolsetUse kali linux tools to further understand the attacker toolsetCrack passwords
IN THIS COURSE
-
4m 1sUpon completion of this video, you will be able to recognize and follow proper hiring practices. FREE ACCESS
-
4m 25sIn this video, you will provision new user accounts in accordance with organizational security policies. FREE ACCESS
-
2m 48sFind out how to apply best practices in personnel management. FREE ACCESS
-
3m 29sIn this video, learn how to distinguish the difference between threats, vulnerabilities, and exploits. FREE ACCESS
-
3m 25sAfter completing this video, you will be able to explain the concept of spoofing. FREE ACCESS
-
4m 51sIn this video, you will learn how to create forged packets using free tools. FREE ACCESS
-
6m 7sUpon completion of this video, you will be able to recognize how impersonation can be used to gain unauthorized access. FREE ACCESS
-
4m 33sAfter completing this video, you will be able to recognize CSS-based attacks. FREE ACCESS
-
4m 44sUpon completion of this video, you will be able to recognize rootkits. FREE ACCESS
-
3m 56sAfter completing this video, you will be able to explain the concept of privilege escalation. FREE ACCESS
-
2m 28sIn this video, learn how to distinguish the difference between common exploit and tools. FREE ACCESS
-
5m 6sDuring this video, you will learn how to use Metasploit tools to further understand the tools attackers use. FREE ACCESS
-
2m 45sLearn how to use Kali Linux tools to further understand the tools attackers use. FREE ACCESS
-
8m 40sIn this video, you will learn how to crack passwords. FREE ACCESS
EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE
Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.
Digital badges are yours to keep, forever.