CompTIA PenTest+: Social Engineering & Specialized System Attacks

Intermediate
  • 11 videos | 56m 3s
  • Includes Assessment
  • Earns a Badge
Rating 4.6 of 23 users Rating 4.6 of 23 users (23)
Familiarize yourself with various aspects of social engineering exploits and attacks, as well as specialized system attacks. This course can be used to prepare for the PT0-001: CompTIA PenTest+ certification exam. Begin by learning about weaknesses in specialized systems, such as SCADA, which is used to remotely monitor and control unmanned critical infrastructure, such as parts of the electrical grid. Next, learn how to address phishing attacks, elicitation exploits, interrogation techniques, impersonation, hoaxing, shoulder surfing, USB key dropping, and motivation techniques. Finally, explore how to choose the best software for a pentesting lab, and how to configure a pentesting lab environment.

WHAT YOU WILL LEARN

  • Describe weaknesses in specialized systems
    Compare phishing attacks
    Specify elicitation exploits
    Define interrogation techniques
    Compare impersonation and hoaxing
    Describe shoulder surfing
  • Describe usb key dropping
    Realize motivation techniques
    Choose the best software for a pentesting lab
    Configure a pentesting lab environment
    Describe social attacks and exploits

IN THIS COURSE

  • 10m 32s
    Upon completion of this video, you will be able to describe weaknesses in specialized systems. FREE ACCESS
  • 5m 3s
    In this video, you will learn how to compare phishing attacks. FREE ACCESS
  • Locked
    3.  Elicitation Exploits
    2m 10s
    Upon completion of this video, you will be able to specify elicitation techniques. FREE ACCESS
  • Locked
    4.  Interrogation Techniques
    2m 53s
    Learn about the interrogation techniques. FREE ACCESS
  • Locked
    5.  Impersonation and Hoaxing
    6m 16s
    In this video, you will learn how to compare and contrast impersonation and hoaxing. FREE ACCESS
  • Locked
    6.  Shoulder Surfing
    3m 57s
    Upon completion of this video, you will be able to describe shoulder surfing. FREE ACCESS
  • Locked
    7.  USB Key Dropping
    2m 31s
    After completing this video, you will be able to describe USB key dropping. FREE ACCESS
  • Locked
    8.  Motivation Techniques
    4m 32s
    In this video, you will learn how to use motivation techniques. FREE ACCESS
  • Locked
    9.  Setting up a Pentesting Lab (Part I)
    8m 13s
    In this video, learn how to choose the best software for a pentesting lab. FREE ACCESS
  • Locked
    10.  Setting up a Pentesting Lab (Part II)
    6m 44s
    In this video, you will learn how to configure a pentesting lab environment. FREE ACCESS
  • Locked
    11.  Exercise: Social Attacks and Exploits
    3m 12s
    Upon completion of this video, you will be able to describe social attacks and how to exploit them. FREE ACCESS

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE

Rating 5.0 of 1 users Rating 5.0 of 1 users (1)
Rating 4.0 of 1 users Rating 4.0 of 1 users (1)
Rating 4.6 of 44 users Rating 4.6 of 44 users (44)

PEOPLE WHO VIEWED THIS ALSO VIEWED THESE

Rating 4.8 of 9 users Rating 4.8 of 9 users (9)
Rating 4.3 of 15 users Rating 4.3 of 15 users (15)
Rating 4.6 of 19 users Rating 4.6 of 19 users (19)