CompTIA PenTest+: Staging & Data Exfiltration

CompTIA PenTest+    |    Intermediate
  • 10 videos | 45m 57s
  • Earns a Badge
Data exfiltration refers to the unauthorized transfer of data from a computer or a network to an external location. It typically involves the extraction of sensitive or confidential information by malicious actors, either through deliberate actions such as hacking or insider threats, or unintentional means such as accidental data leaks. In this course, you'll explore various concepts related to staging and data exfiltration. Discover how encryption and compression can help obfuscate the collected data and minimize the amount of data sent over the network, and explore how to leverage covert communication channels to transfer illegitimate data. Lastly, explore how to leverage email, cross-account resources, cloud storage, alternate data streams, text storage sites, and virtual drive mounting to be used for data exfiltration. This course is one of a collection that helps prepare learners for the CompTIA PenTest+ (PT0-003) certification exam.

WHAT YOU WILL LEARN

  • Discover the key concepts covered in this course
    Discuss how encryption and compression can help obfuscate the collected data and minimize the amount of data sent over the network
    Recognize how to leverage covert communication channels to transfer illegitimate data
    Describe how email can be used to exfiltrate data sitting on outbound email systems
    Describe the risks associated with cross-account resource access
  • Recognize how to exfiltrate data from a compromised cloud environment
    Outline how to leverage alternate data streams to perform data exfiltration
    Extract data from text storage sites, otherwise known as pastebin websites
    Mount a virtual drive and extract data from it
    Summarize the key concepts covered in this course

IN THIS COURSE

  • 1m 4s
    In this video, we will discover the key concepts covered in this course. FREE ACCESS
  • 5m 31s
    After completing this video, you will be able to discuss how encryption and compression can help obfuscate the collected data and minimize the amount of data sent over the network. FREE ACCESS
  • Locked
    3.  Data Exfiltration Through Covert Channels
    6m 48s
    Upon completion of this video, you will be able to recognize how to leverage covert communication channels to transfer illegitimate data. FREE ACCESS
  • Locked
    4.  Email Exfiltration
    5m 31s
    In this video, learn how to describe how email can be used to exfiltrate data sitting on outbound email systems. FREE ACCESS
  • Locked
    5.  Cross-account Resource Access
    5m 12s
    In this video, we will describe the risks associated with cross-account resource access. FREE ACCESS
  • Locked
    6.  Data Exfiltration on Cloud
    6m 21s
    After completing this video, you will be able to recognize how to exfiltrate data from a compromised cloud environment. FREE ACCESS
  • Locked
    7.  Alternate Data Stream Exploitation
    5m 24s
    Upon completion of this video, you will be able to outline how to leverage alternate data streams to perform data exfiltration. FREE ACCESS
  • Locked
    8.  Pastebin Websites
    5m 53s
    Learn how to extract data from text storage sites, otherwise known as pastebin websites. FREE ACCESS
  • Locked
    9.  Virtual Drive Data Exfiltration
    3m 36s
    Find out how to mount a virtual drive and extract data from it. FREE ACCESS
  • Locked
    10.  Course Summary
    37s
    In this video, we will summarize the key concepts covered in this course. FREE ACCESS

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE

Rating 5.0 of 1 users Rating 5.0 of 1 users (1)
Rating 5.0 of 2 users Rating 5.0 of 2 users (2)