CompTIA PenTest+: Network-Based Exploits
Intermediate
- 12 videos | 1h 18m
- Includes Assessment
- Earns a Badge
Discover how to exploit vulnerabilities in wired and wireless networks that take advantage of weaknesses at several layers of the OSI model. During this course, you will explore name resolution, SMB, FTP, DNS, and pass the hash exploits, as well as denial-of-service, NAC bypass and VLAN hopping. Other topics include evil twin, bluejacking, bluesnarfing, cloning, jamming, man-in-the-middle, and repeating. This course can be used as part of the preparation for the PT0-001: CompTIA PenTest+ certification exam. As a review exercise, you will name four weaknesses or specific attacks on WEP, list four scanner SMB auxiliary Metasploit modules, and list four of the five top DNS attacks during 2017/2018.
WHAT YOU WILL LEARN
-
Compare name resolution and smb exploitsExploit snmp and smtp protocolsDescribe ftp and dns exploitsDefine pass the hashDescribe man-in-the-middle attacksClassify denial-of-service exploits
-
Describe nac bypass and vlan hoppingDescribe evil twin and deauthenticationClassify fragmentation and wps exploitsCompare bluejacking to bluesnarfingIdentify cloning, jamming, and repeatingDescribe network exploits
IN THIS COURSE
-
9m 24sIn this video, find out how to compare name resolution and SMB exploits. FREE ACCESS
-
7m 54sLearn how to exploit the SNMP and SMTP protocols. FREE ACCESS
-
5m 53sUpon completion of this video, you will be able to describe FTP and DNS exploits. FREE ACCESS
-
10m 26sIn this video, find out how to define "pass the hash." FREE ACCESS
-
5m 51sUpon completion of this video, you will be able to describe man-in-the-middle attacks. FREE ACCESS
-
8m 43sIn this video, you will learn how to classify denial-of-service attacks. FREE ACCESS
-
7m 34sAfter completing this video, you will be able to describe NAC bypass and VLAN hopping. FREE ACCESS
-
10m 9sUpon completion of this video, you will be able to describe an evil twin and deauthentication. FREE ACCESS
-
4m 27sIn this video, learn how to classify fragmentation and WPS exploits. FREE ACCESS
-
2m 48sIn this video, you will compare bluejacking to bluesnarfing. FREE ACCESS
-
2m 8sFind out how to identify cloning, jamming, and repeating. FREE ACCESS
-
2m 42sUpon completion of this video, you will be able to describe network vulnerabilities. FREE ACCESS
EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE
Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.
Digital badges are yours to keep, forever.