CompTIA Cybersecurity Analyst+: Network Reconnaissance & Security Policies

Cyber Security    |    Intermediate
  • 12 videos | 1h 8m 32s
  • Includes Assessment
  • Earns a Badge
Rating 4.2 of 54 users Rating 4.2 of 54 users (54)
Gathering information regarding network vulnerabilities is a critical step in thwarting potential exploits. Explore network reconnaissance and security policies, including logging, traffic intercepts, and hacking techniques.

WHAT YOU WILL LEARN

  • Explain how to discover network devices
    Use logs to learn about the network environment
    Use packet capturing tools for network traffic analysis
    Capture and interpret ftp and http traffic
    Discover network configurations
    Explain harvesting techniques
  • Recognize social engineering techniques
    Identify details within acceptable use policies
    Identify details within data ownership and retention policies
    Identify details within data classification policies
    Identify details within a password policy
    Recognize various network configurations and perform network reconnaissance

IN THIS COURSE

  • 10m 25s
    After completing this video, you will be able to explain how to discover network devices. FREE ACCESS
  • 8m 12s
    Find out how to use logs to learn about the network environment. FREE ACCESS
  • Locked
    3.  Packet Capturing
    6m 46s
    During this video, you will learn how to use packet capturing tools to analyze network traffic. FREE ACCESS
  • Locked
    4.  Capture FTP and HTTP Traffic
    6m 9s
    In this video, you will learn how to capture and interpret FTP and HTTP traffic. FREE ACCESS
  • Locked
    5.  Network Infrastructure Discovery
    4m 8s
    After completing this video, you will be able to discover network configurations. FREE ACCESS
  • Locked
    6.  E-mail and DNS Harvesting
    4m 52s
    After completing this video, you will be able to explain harvesting techniques. FREE ACCESS
  • Locked
    7.  Social Engineering and Phishing
    5m 59s
    After completing this video, you will be able to recognize social engineering techniques. FREE ACCESS
  • Locked
    8.  Acceptable Use Policy
    3m 13s
    During this video, you will learn how to identify details within acceptable use policies. FREE ACCESS
  • Locked
    9.  Data Ownership and Retention Policy
    3m 24s
    In this video, find out how to identify details within data ownership and retention policies. FREE ACCESS
  • Locked
    10.  Data Classification Policy
    9m 6s
    In this video, learn how to identify details within data classification policies. FREE ACCESS
  • Locked
    11.  Password Policy
    2m 48s
    Learn how to identify details within a password policy. FREE ACCESS
  • Locked
    12.  Exercise: Network Architecture and Reconnaissance
    3m 33s
    After completing this video, you will be able to recognize various network configurations and perform network reconnaissance. FREE ACCESS

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE

Rating 4.6 of 5 users Rating 4.6 of 5 users (5)
Rating 4.4 of 5 users Rating 4.4 of 5 users (5)
Rating 4.8 of 5 users Rating 4.8 of 5 users (5)

PEOPLE WHO VIEWED THIS ALSO VIEWED THESE

Rating 4.7 of 62 users Rating 4.7 of 62 users (62)
Rating 4.2 of 13 users Rating 4.2 of 13 users (13)
Rating 4.6 of 22 users Rating 4.6 of 22 users (22)