CompTIA PenTest+: Network Attacks & Exploits

CompTIA    |    Intermediate
  • 19 videos | 2h 6m 55s
  • Includes Assessment
  • Earns a Badge
Rating 4.8 of 27 users Rating 4.8 of 27 users (27)
Network attacks are commonly performed to gain unauthorized access to an organization's network, with a goal of performing malicious activity or stealing data. In this course, you'll learn how to research attack vectors and perform network attacks. You'll learn about password attacks such as password spraying, hash cracking, brute force, and dictionary. You'll explore how to perform common network attacks such as ARP poisoning, on-path, kerberoasting, virtual local area network hopping, as well as Link-Local Multicast Name Resolution and NetBIOS Name Service poisoning. Finally, you'll explore common network attack tools such as Metasploit, Netcat, and Nmap. This course is one of a collection that helps prepare learners for the CompTIA PenTest+ (PT0-002) certification exam.

WHAT YOU WILL LEARN

  • Discover the key concepts covered in this course
    Describe how to verify the stability and reliability of a service and system
    List common exploit resources such as exploit database
    Provide an overview of arp poisoning attacks
    List characteristics of an exploit chaining attack
    Describe common password attacks such as password spraying and brute force
    Describe on-path attacks, formerly known as man-in-the-middle attacks
    Provide an overview of kerberoasting network attacks
    Provide an overview of dns cache poisoning
    Describe virtual local area network (vlan) hopping attacks and mitigation strategies
  • Provide an overview of network access control (nac) bypass hacking
    Recognize how to perform media access control spoofing
    Describe how to perform a link-local multicast name resolution (llmnr) attack
    Provide an overview of new technology lan manager (ntlm) relay attacks
    Recognize how to exploit snmp and smtp protocols
    Classify denial of service exploits
    Describe ftp and dns exploits
    Provide an overview of network attack tools such as metasploit, netcat, and nmap
    Summarize the key concepts covered in this course

IN THIS COURSE

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE

Rating 4.6 of 38 users Rating 4.6 of 38 users (38)
Rating 5.0 of 3 users Rating 5.0 of 3 users (3)

PEOPLE WHO VIEWED THIS ALSO VIEWED THESE

Rating 5.0 of 4 users Rating 5.0 of 4 users (4)
Rating 4.3 of 69 users Rating 4.3 of 69 users (69)
Rating 4.4 of 121 users Rating 4.4 of 121 users (121)