CompTIA PenTest+: Staging & Data Exfiltration
CompTIA PenTest+
| Intermediate
- 10 videos | 45m 57s
- Earns a Badge
Data exfiltration refers to the unauthorized transfer of data from a computer or a network to an external location. It typically involves the extraction of sensitive or confidential information by malicious actors, either through deliberate actions such as hacking or insider threats, or unintentional means such as accidental data leaks. In this course, you'll explore various concepts related to staging and data exfiltration. Discover how encryption and compression can help obfuscate the collected data and minimize the amount of data sent over the network, and explore how to leverage covert communication channels to transfer illegitimate data. Lastly, explore how to leverage email, cross-account resources, cloud storage, alternate data streams, text storage sites, and virtual drive mounting to be used for data exfiltration. This course is one of a collection that helps prepare learners for the CompTIA PenTest+ (PT0-003) certification exam.
WHAT YOU WILL LEARN
-
Discover the key concepts covered in this courseDiscuss how encryption and compression can help obfuscate the collected data and minimize the amount of data sent over the networkRecognize how to leverage covert communication channels to transfer illegitimate dataDescribe how email can be used to exfiltrate data sitting on outbound email systemsDescribe the risks associated with cross-account resource access
-
Recognize how to exfiltrate data from a compromised cloud environmentOutline how to leverage alternate data streams to perform data exfiltrationExtract data from text storage sites, otherwise known as pastebin websitesMount a virtual drive and extract data from itSummarize the key concepts covered in this course
IN THIS COURSE
-
1m 4sIn this video, we will discover the key concepts covered in this course. FREE ACCESS
-
5m 31sAfter completing this video, you will be able to discuss how encryption and compression can help obfuscate the collected data and minimize the amount of data sent over the network. FREE ACCESS
-
6m 48sUpon completion of this video, you will be able to recognize how to leverage covert communication channels to transfer illegitimate data. FREE ACCESS
-
5m 31sIn this video, learn how to describe how email can be used to exfiltrate data sitting on outbound email systems. FREE ACCESS
-
5m 12sIn this video, we will describe the risks associated with cross-account resource access. FREE ACCESS
-
6m 21sAfter completing this video, you will be able to recognize how to exfiltrate data from a compromised cloud environment. FREE ACCESS
-
5m 24sUpon completion of this video, you will be able to outline how to leverage alternate data streams to perform data exfiltration. FREE ACCESS
-
5m 53sLearn how to extract data from text storage sites, otherwise known as pastebin websites. FREE ACCESS
-
3m 36sFind out how to mount a virtual drive and extract data from it. FREE ACCESS
-
37sIn this video, we will summarize the key concepts covered in this course. FREE ACCESS
EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE
Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.
Digital badges are yours to keep, forever.