Discovery and Attack Vectors
Cybersecurity
| Beginner
- 10 videos | 45m 16s
- Includes Assessment
- Earns a Badge
The discovery phase includes performing different types of reconnaissance on a target. To accomplish this, attackers can use a series of techniques, exploits, and tools. In this course, learn about common attack vectors such as malware, social engineering, and session hijacking. Discover how to collect legacy and archived web page content using discovery tools, and learn how to identify domains and IP addresses using the Netcraft website. Explore how to maximize command-line tools to discover shares and local network configurations, and learn the importance of checking to see if targets are using default passwords. You'll also discover how footprinting can be used to extract details of a website, how to disable NetBIOS, how to use kali to perform banner grabbing. Lastly, discover countermeasure techniques such as using generic domain names, hardening systems, and turning off unnecessary protocols and services. This course was originally created by Global Knowledge (GK).
WHAT YOU WILL LEARN
-
Recognize the role of the discovery phase in a security investigationList common attack vectors such as malware, social engineering, and session hijackingCollect legacy and archived web page content using discovery toolsDemonstrate how to identify domains and ip addresses using the netcraft websiteDescribe the importance of checking to see if targets are using default passwords
-
Demonstrate how to use command line tools to discover shares and local network configurationsDescribe how footprinting can be used to extract details of a websiteUse kali to perform banner grabbingList discovery countermeasure techniques such as using generic domain names, hardening systems, and turning off unnecessary protocols and servicesDisable netbios over tcp/ip
IN THIS COURSE
-
45s
-
10m 6s
-
4m 39s
-
5m 15s
-
1m 26s
-
4m 1s
-
3m 40s
-
2m 48s
-
9m 13s
-
3m 24s
EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE
Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.
Digital badges are yours to keep, forever.