Network Attacks

Intermediate
  • 12 videos | 1h 18m 56s
  • Includes Assessment
  • Earns a Badge
Rating 4.6 of 36 users Rating 4.6 of 36 users (36)
Explore various types of attacks that can compromise a network, including DoS, insider threats, and ransomware

WHAT YOU WILL LEARN

  • Summarize dos attacks such as reflective, amplified, and distributed
    Recognize social engineering
    Recognize insider threats
    Describe logic bombs and evil twin attacks
    Describe wardriving and phishing
    Recognize rogue access points and spoofing
  • Summarize dns and arp poisoning attacks
    Describe ransomware
    Summarize deauthentication and brute force attacks
    Recognize vlan hopping and man-in-the-middle attacks
    Differentiate between exploits and vulnerabilities
    Recognize various network attacks

IN THIS COURSE

  • 8m 11s
    In this video, learn how to summarize Denial of Service attacks such as reflective, amplified, and distributed. FREE ACCESS
  • 8m 42s
    Upon completion of this video, you will be able to recognize social engineering attacks. FREE ACCESS
  • Locked
    3.  Insider Threats
    6m 46s
    After completing this video, you will be able to recognize the signs of an insider threat. FREE ACCESS
  • Locked
    4.  Logic Bombs and Evil Twins
    5m 57s
    Upon completion of this video, you will be able to describe logic bombs and evil twin attacks. FREE ACCESS
  • Locked
    5.  Wardriving and Phishing
    5m 21s
    After completing this video, you will be able to describe wardriving and phishing. FREE ACCESS
  • Locked
    6.  Rogue Access Points and Spoofing
    7m 2s
    Upon completion of this video, you will be able to recognize rogue access points and spoofing attacks. FREE ACCESS
  • Locked
    7.  DNS and ARP Poisoning
    6m 38s
    Learn how to summarize DNS and ARP poisoning attacks. FREE ACCESS
  • Locked
    8.  Ransomware
    4m 9s
    After completing this video, you will be able to describe ransomware. FREE ACCESS
  • Locked
    9.  Deauthentication and Brute Force
    6m 13s
    In this video, learn how to summarize deauthentication and brute force attacks. FREE ACCESS
  • Locked
    10.  VLAN Hopping and Man-in-the-Middle
    8m 42s
    After completing this video, you will be able to recognize VLAN hopping and man-in-the-middle attacks. FREE ACCESS
  • Locked
    11.  Exploits vs. Vulnerabilities
    6m 44s
    In this video, you will learn how to differentiate between exploits and vulnerabilities. FREE ACCESS
  • Locked
    12.  Exercise: Identify Network Attacks
    4m 31s
    After completing this video, you will be able to recognize various network attacks. FREE ACCESS

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE

Rating 5.0 of 1 users Rating 5.0 of 1 users (1)
Rating 4.6 of 215 users Rating 4.6 of 215 users (215)

PEOPLE WHO VIEWED THIS ALSO VIEWED THESE

Rating 4.5 of 129 users Rating 4.5 of 129 users (129)
Rating 4.6 of 369 users Rating 4.6 of 369 users (369)
Rating 4.4 of 121 users Rating 4.4 of 121 users (121)