End-User Security: Securing End Users against Attackers
Security
| Beginner
- 10 videos | 32m 49s
- Includes Assessment
- Earns a Badge
This 10-video course examines end-user security from the rogue attacker point of view, including motivations, Malware-as-a-Service (MaaS) phishing techniques, pharming, ransomware, data theft, cryptojacking, denial-of-service (DoS), and toolkits. One of the first things to do to be successful as a security technician or practitioner is to start to understand the mind of the attacker, so you will examine the possible motives for attacking user endpoints. You will then take a look at Malware-as-a-Service, which is available all over the world. You will explore the phishing techniques an attacker might take, as they are becoming stealthier, sending phishing e-mails over varied infrastructures. Delve into ransomware, this time from the attacker's perspective, and learn about data breaches and theft. You will also examine cryptojacking, what it is and explore some examples, and have a look at DoS and distributed-denial-of-service (DdoS) attacks using, for example, botnets. The final tutorial surveys common exploit kits such as Kali Linux and Metasploit. The concluding exercise entails listing common motives for attacking endpoints, common ransomware payloads, and exploit kits.
WHAT YOU WILL LEARN
-
Discover the key concepts covered in this courseDescribe attack motivationDefine malware-as-a-serviceCompare phishing techniquesDescribe ransomware
-
Describe data breaches and theftDefine cryptojackingDescribe dos and ddos attacksCompare common exploit kitsList common motives for attacking endpoints, common ransomware payloads, and exploit kits
IN THIS COURSE
-
1m 31s
-
4mUpon completion of this video, you will be able to describe the motivation for an attack. FREE ACCESS
-
3m 34sIn this video, find out how to define malware as a service. FREE ACCESS
-
3m 30sIn this video, you will compare phishing techniques. FREE ACCESS
-
5m 40sUpon completion of this video, you will be able to describe ransomware. FREE ACCESS
-
2m 3sUpon completion of this video, you will be able to describe data breaches and data theft. FREE ACCESS
-
3m 57sIn this video, you will learn how to define cryptojacking. FREE ACCESS
-
4m 11sUpon completion of this video, you will be able to describe DoS and DDoS attacks. FREE ACCESS
-
2m 55sDuring this video, you will learn how to compare common exploit kits. FREE ACCESS
-
1m 28sAfter completing this video, you will be able to list common motives for attacking endpoints, common ransomware payloads, and common exploit kits. FREE ACCESS
EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE
Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.
Digital badges are yours to keep, forever.