CompTIA Security+: Analyzing Application & Network Attacks
CompTIA
| Intermediate
- 15 videos | 55m 59s
- Includes Assessment
- Earns a Badge
It is crucial that you be able to recognize various application and network attacks and be able to protect your infrastructure from them. In this course, you'll learn to analyze different application attacks such as privilege escalation, cross-site scripting, request forgery, injection, code, and APIs. You'll also look at other attacks like SSL stripping, pass the hash, and driver manipulation. Then, you'll move on to explore a variety of network attacks, including wireless, man-in-the-middle, Layer 2, DNS, DDoS, and malicious code or script execution. This course can be used in preparation for the CompTIA Security+ SY0-601 certification exam.
WHAT YOU WILL LEARN
-
Discover the key concepts covered in this courseDescribe privilege escalation and elevation techniques that exploit poor least privilege policiesDescribe and compare cross-site scripting and cross-site request forgery, which are now the most common attacks against web servicesDescribe different injection attacks against sql, dlls, ldap, and xmlRecognize a variety of coding attacks like pointer/object dereference, directory traversal, buffer overflows, and race conditionsDescribe api attacks, the most common being against login credentials and authenticationDescribe secure sockets layer stripping against web servers and pass the hash attacks against older version of windows operating systems, which are still common in iot and embedded devicesDefine device driver manipulation in windows and *nix systems including shimming and refactoring
-
Describe wireless attacks like evil twin, rogue access points, disassociation, and jammingDefine exploits where the attacker secretly relays and possibly alters communications between two parties who assume they are communicating with each otherDescribe layer 2 attacks such as arp poisoning, mac flooding, and mac cloningDefine dns attacks such as domain hijacking, dns poisoning, and url redirectionDescribe ddos attacks against the network, applications, and operational technologyRecognize malicious code or script execution targeting powershell, python, bash shells, macros, and visual basic for applicationsSummarize the key concepts covered in this course
IN THIS COURSE
-
1m 37s
-
4m 1sUpon completion of this video, you will be able to describe privilege escalation and elevation techniques that exploit poor least privilege policies. FREE ACCESS
-
5m 10sAfter completing this video, you will be able to describe and compare cross-site scripting and cross-site request forgery, which are now the most common attacks against web services. FREE ACCESS
-
4m 37sUpon completion of this video, you will be able to describe different injection attacks against SQL, DLLs, LDAP, and XML. FREE ACCESS
-
8m 52sUpon completion of this video, you will be able to recognize a variety of coding attacks, including pointer/object dereference, directory traversal, buffer overflows, and race conditions. FREE ACCESS
-
2m 25sUpon completion of this video, you will be able to describe API attacks, the most common being against login credentials and authentication. FREE ACCESS
-
1m 45sAfter completing this video, you will be able to describe secure sockets layer stripping against web servers and pass the hash attacks against older versions of Windows operating systems, which are still common in IoT and embedded devices. FREE ACCESS
-
2m 25sIn this video, you will learn how to define device driver manipulation in Windows and *nix systems, including shimming and refactoring. FREE ACCESS
-
9m 43sUpon completion of this video, you will be able to describe wireless attacks such as evil twin, rogue access points, disassociation, and jamming. FREE ACCESS
-
3m 14sIn this video, you will define exploits where the attacker secretly relays and possibly alters communications between two parties who assume they are communicating with each other. FREE ACCESS
-
3m 43sUpon completion of this video, you will be able to describe Layer 2 attacks such as ARP poisoning, MAC flooding, and MAC cloning. FREE ACCESS
-
2m 43sIn this video, you will learn how to define DNS attacks such as domain hijacking, DNS poisoning, and URL redirection. FREE ACCESS
-
3m 6sUpon completion of this video, you will be able to describe DDoS attacks against networks, applications, and operational technology. FREE ACCESS
-
1m 57sAfter completing this video, you will be able to recognize malicious code or script execution targeting PowerShell, Python, Bash shells, macros, and Visual Basic for Applications. FREE ACCESS
-
42s
EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE
Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.
Digital badges are yours to keep, forever.