CompTIA Cybersecurity Analyst+: Network Reconnaissance & Security Policies
Cyber Security
| Intermediate
- 12 videos | 1h 8m 32s
- Includes Assessment
- Earns a Badge
Gathering information regarding network vulnerabilities is a critical step in thwarting potential exploits. Explore network reconnaissance and security policies, including logging, traffic intercepts, and hacking techniques.
WHAT YOU WILL LEARN
-
Explain how to discover network devicesUse logs to learn about the network environmentUse packet capturing tools for network traffic analysisCapture and interpret ftp and http trafficDiscover network configurationsExplain harvesting techniques
-
Recognize social engineering techniquesIdentify details within acceptable use policiesIdentify details within data ownership and retention policiesIdentify details within data classification policiesIdentify details within a password policyRecognize various network configurations and perform network reconnaissance
IN THIS COURSE
-
10m 25sAfter completing this video, you will be able to explain how to discover network devices. FREE ACCESS
-
8m 12sFind out how to use logs to learn about the network environment. FREE ACCESS
-
6m 46sDuring this video, you will learn how to use packet capturing tools to analyze network traffic. FREE ACCESS
-
6m 9sIn this video, you will learn how to capture and interpret FTP and HTTP traffic. FREE ACCESS
-
4m 8sAfter completing this video, you will be able to discover network configurations. FREE ACCESS
-
4m 52sAfter completing this video, you will be able to explain harvesting techniques. FREE ACCESS
-
5m 59sAfter completing this video, you will be able to recognize social engineering techniques. FREE ACCESS
-
3m 13sDuring this video, you will learn how to identify details within acceptable use policies. FREE ACCESS
-
3m 24sIn this video, find out how to identify details within data ownership and retention policies. FREE ACCESS
-
9m 6sIn this video, learn how to identify details within data classification policies. FREE ACCESS
-
2m 48sLearn how to identify details within a password policy. FREE ACCESS
-
3m 33sAfter completing this video, you will be able to recognize various network configurations and perform network reconnaissance. FREE ACCESS
EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE
Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.
Digital badges are yours to keep, forever.