CompTIA Cybersecurity Analyst+: Malicious Techniques & Procedures
Cybersecurity
| Intermediate
- 15 videos | 1h 27m 15s
- Includes Assessment
- Earns a Badge
Understanding the characteristics of various types of attacks goes a long way in helping cybersecurity analysts prevent and detect malicious activity. A knowledge of techniques and attacks such as buffer overflows and distributed denial-of-service (DDoS) attacks facilitates mitigation planning. In this course, I will begin by covering how SYN flood attacks from the 3-way Transmission Control Protocol (TCP) handshake. Next, I will detail various types of buffer overflow, cross-site scripting (XSS), and injection attacks. I will then execute a structured query language (SQL) injection attack followed by discussing potential extensible markup language (XML) vulnerabilities and DDoS attack mitigations. Moving on, I will run a denial-of-service (DoS), client web browser, and reverse shell attack. Lastly, I will spoof network traffic, crack Remote Desktop Protocol (RDP) passwords and discuss common Wi-Fi attacks. This course can be used to prepare for the CS0-003: CompTIA Cybersecurity Analyst+ exam.
WHAT YOU WILL LEARN
-
Discover the key concepts covered in this courseOutline the mechanics of a syn flood attackRecognize how buffer overflow attacks work and how to mitigate themRecognize how cross-site scripting (xss) attacks occurIdentify types of injection attacksRun a sql injection attackOutline how the use of insecure xml components such as local and remote file inclusion can lead to web application compromiseMitigate distributed denial-of-service (ddos) attacks
-
Use the slowhttptest command to run a denial-of-service (dos) attack against a websiteUse the browser exploitation framework (beef) tool to hack a web browserWork with reverse shells and recognize how to mitigate the risks they presentUse hping3 to forge network trafficUse the hydra tool to brute force a windows remote desktop protocol (rdp) connectionRecognize common wi-fi attacksSummarize the key concepts covered in this course
IN THIS COURSE
-
1m 16sIn this video, we will discover the key concepts covered in this course. FREE ACCESS
-
6m 11sAfter completing this video, you will be able to outline the mechanics of a SYN flood attack. FREE ACCESS
-
6m 22sUpon completion of this video, you will be able to recognize how buffer overflow attacks work and how to mitigate them. FREE ACCESS
-
6m 31sAfter completing this video, you will be able to recognize how cross-site scripting (XSS) attacks occur. FREE ACCESS
-
7m 51sUpon completion of this video, you will be able to identify types of injection attacks. FREE ACCESS
-
6m 45sIn this video, you will learn how to run a SQL injection attack. FREE ACCESS
-
5m 15sAfter completing this video, you will be able to outline how the use of insecure XML components such as local and remote file inclusion can lead to web application compromise. FREE ACCESS
-
6m 24sIn this video, you will learn how to mitigate distributed denial-of-service (DDoS) attacks. FREE ACCESS
-
6m 40sDuring this video, discover how to use the slowhttptest command to run a denial-of-service (DoS) attack against a website. FREE ACCESS
-
7m 54sLearn how to use the Browser Exploitation Framework (BeEF) tool to hack a web browser. FREE ACCESS
-
6m 56sDiscover how to work with reverse shells and recognize how to mitigate the risks they present. FREE ACCESS
-
4m 58sIn this video, discover how to use hping3 to forge network traffic. FREE ACCESS
-
5m 54sFind out how to use the hydra tool to brute force a Windows Remote Desktop Protocol (RDP) connection. FREE ACCESS
-
7m 27sAfter completing this video, you will be able to recognize common Wi-Fi attacks. FREE ACCESS
-
53sIn this video, we will summarize the key concepts covered in this course. FREE ACCESS
EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE
Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.
Digital badges are yours to keep, forever.