CompTIA Cybersecurity Analyst+: Network Scanning & Traffic Analysis
Cybersecurity Analyst+
| Intermediate
- 13 videos | 1h 59s
- Includes Assessment
- Earns a Badge
Discover how vulnerability scanning can detect weaknesses while pen testing exploits weaknesses. Explore these activities along with how intrusion detection and prevention help secure networks, hosts, apps and data for organizations. This course can be used in preparation for the CompTIA Cybersecurity Analyst (CySA+) Certification Exam CS0-002.
WHAT YOU WILL LEARN
-
Discover the key concepts covered in this courseRecognize how vulnerability scanning identifies security weaknessesRecognize how pen testing identifies and exploits security weaknessesRecognize how metasploit fits into penetration testingExplore the metasploit frameworkDownload and install an exploitable vmUse a variety of metasploit scanning and exploit techniques
-
Run an nmap network scanCompare baseline and current scans to identify changesRun a nessus vulnerability scanView vulnerability scan resultsUse the hping tool to generate network syn flood trafficSummarize the key concepts covered in this course
IN THIS COURSE
-
1m 59s
-
5m 38sUpon completion of this video, you will be able to recognize how vulnerability scanning identifies security weaknesses. FREE ACCESS
-
5m 3sAfter completing this video, you will be able to recognize how pen testing identifies and exploits security weaknesses. FREE ACCESS
-
3m 49sAfter completing this video, you will be able to recognize how Metasploit fits into penetration testing. FREE ACCESS
-
5m 19sLearn how to use the Metasploit Framework. FREE ACCESS
-
2m 39sIn this video, find out how to download and install a VM that can be exploited. FREE ACCESS
-
9m 13sIn this video, find out how to use a variety of metasploit scanning and exploitation techniques. FREE ACCESS
-
9m 23sDuring this video, you will learn how to run a Nmap network scan. FREE ACCESS
-
4m 3sIn this video, you will learn how to compare baseline and current scans to identify changes. FREE ACCESS
-
5m 15sDuring this video, you will learn how to run a Nessus scan. FREE ACCESS
-
4m 13sThis video will show you how to view the results of a vulnerability scan. FREE ACCESS
-
3m 12sIn this video, you will use the hping tool to generate network traffic that will cause a SYN flood. FREE ACCESS
-
1m 13s
EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE
Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.
Digital badges are yours to keep, forever.