Final Exam: SecOps Tools Proficiency
SecOps
| Beginner
- 1 video | 32s
- Includes Assessment
- Earns a Badge
Final Exam: SecOps Tools Proficiency will test your knowledge and application of the topics presented throughout the SecOps Tools Proficiency track.
WHAT YOU WILL LEARN
-
Discover common tools used for information gatheringdescribe ethical hackingidentify how to use exploitation tools to exploit a system on the networkdiscuss the motivation for building a sectools toolboxdescribe, perhaps, why you would not want to use kali linuxdiscover how to install kali linux in a vmdiscover the kali linux user interface and learn how to launch the different toolsidentify how to perform a port scan with kali linuxsummarize the different indicators of compromisea summary of the attack and the impact of the attacka brief summary of the attack and the impact of the attackan overview of different brute forcing tools that could be used to conduct this type of attackconduct a brute force attack using javascripta brief background of the facebook attack and overall impactunderstand the basic background of the colonial pipeline attack and what made it possibleunderstand how the attack was discovered and disclosedunderstand how to harvest login credentials from the webconduct a phishing exercise using zphisherscan for a vulnerability using nmapprovide an overview of the revil ransomwaretools that can scan open ips for vulnerabilitiesunderstand the basic background of the attack and what made it possibleunderstand how supply chain attacks workunderstand how kaseya responded to the breachscanning your network using log4j-scanconduct a full attack using netcat, python web server, and log4shellunderstand what tools are available to detect and exploit log4j vulnerabilitiesoutline the key features of the burp suite tool and its productsidentify the limitations of the burp suite toolinstall burp suite
-
list known limitations of the namp utilitydownload and install the nmap utilityperform a nmap tcp connect scanoutline potential limitations of the wireshark utilitydemonstrate how to download and install wiresharkprovide an overview of wireshark, its intended purposes, and featuresprovide an overview of discovery scan options in metasploitdemonstrate how to work with modules, exploits, and payloads in metasploitexplore and execute common metasploit commandsprovide an overview of the aircrack-ng suite of toolslist commonly used individual utilities found within aircrack-ngcompare and contrast common alternatives to aircrack-ng, including trackerjacker, eaphammer, wifiphisher, wireshark, airgeddon, acrylic wi-fiprovide an overview of the netcat and a brief history of the utilitydiscuss the various common options available in netcatdemonstrate how to start and navigate the netcat commands such as nc-help, nc -z -v, nc -i, and printflist the tools found in the hashcat suiteprovide an overview of the many hashcat featuresdescribe characteristics of the core attack modes that include dictionary attack, combinator attack, brute-force attack, hybrid attack, and association attackprovide an overview and history of the sqlmap utilityprovide an overview of sqlmap featuresdiscuss sqlmap dependencies, including the various python librarieslist autopsy features such as timeline analysis, keyword searching, email analysis, and registry analysisdownload and install autopsydemonstrate the various ways to add a data source in autopsyprovide an overview of the social-engineer toolkit (set)provide an overview of key social-engineer toolkit (set) featuresprovide an overview of the different set attack vectors including phishing, web, infectious media generator, payload and listeners, and mass mailer attacksdiscuss the history of artificial intelligence (ai) dating back to when the field of artificial intelligence was first researchedlist common benefits of working with artificial intelligence (ai)describe common components of artificial intelligence (ai)
EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE
Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.
Digital badges are yours to keep, forever.