CompTIA PenTest+: Social Engineering & Specialized System Attacks
Intermediate
- 11 videos | 56m 3s
- Includes Assessment
- Earns a Badge
Familiarize yourself with various aspects of social engineering exploits and attacks, as well as specialized system attacks. This course can be used to prepare for the PT0-001: CompTIA PenTest+ certification exam. Begin by learning about weaknesses in specialized systems, such as SCADA, which is used to remotely monitor and control unmanned critical infrastructure, such as parts of the electrical grid. Next, learn how to address phishing attacks, elicitation exploits, interrogation techniques, impersonation, hoaxing, shoulder surfing, USB key dropping, and motivation techniques. Finally, explore how to choose the best software for a pentesting lab, and how to configure a pentesting lab environment.
WHAT YOU WILL LEARN
-
Describe weaknesses in specialized systemsCompare phishing attacksSpecify elicitation exploitsDefine interrogation techniquesCompare impersonation and hoaxingDescribe shoulder surfing
-
Describe usb key droppingRealize motivation techniquesChoose the best software for a pentesting labConfigure a pentesting lab environmentDescribe social attacks and exploits
IN THIS COURSE
-
10m 32sUpon completion of this video, you will be able to describe weaknesses in specialized systems. FREE ACCESS
-
5m 3sIn this video, you will learn how to compare phishing attacks. FREE ACCESS
-
2m 10sUpon completion of this video, you will be able to specify elicitation techniques. FREE ACCESS
-
2m 53sLearn about the interrogation techniques. FREE ACCESS
-
6m 16sIn this video, you will learn how to compare and contrast impersonation and hoaxing. FREE ACCESS
-
3m 57sUpon completion of this video, you will be able to describe shoulder surfing. FREE ACCESS
-
2m 31sAfter completing this video, you will be able to describe USB key dropping. FREE ACCESS
-
4m 32sIn this video, you will learn how to use motivation techniques. FREE ACCESS
-
8m 13sIn this video, learn how to choose the best software for a pentesting lab. FREE ACCESS
-
6m 44sIn this video, you will learn how to configure a pentesting lab environment. FREE ACCESS
-
3m 12sUpon completion of this video, you will be able to describe social attacks and how to exploit them. FREE ACCESS
EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE
Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.
Digital badges are yours to keep, forever.