Pen Testing: End-user Behavior
IT Security
| Intermediate
- 14 videos | 1h 47m 2s
- Includes Assessment
- Earns a Badge
Explore penetration testing, its limitations, and how end-user behavior affects this process in this 14-video course, which examines several types of penetration testing, the reliance on end-user behavior, and the challenges facing organizations. You will explore the role of human error in causing data breaches, user awareness, preventing attacks, and how to use end-user analytics. You will learn to use tools to perform user behavior analytics, and how to use test results to create and communicate reports. Next, learners will examine how to create a plan for organizations to check user behavior when a threat is received, and explore the need for cybersecurity training for employees. You will learn to use advanced analytics that focus on user activity instead of specific static threat indicators to detect anomalies or malicious behavior. You will explore social engineering attacks, how to perform a social engineering penetration test, and how to counter social engineering attacks. Finally, examine the role played by human behavior in penetration testing.
WHAT YOU WILL LEARN
-
Discover the key concepts covered in this courseIdentify penetration testing types and describe their reliance on end-user behaviorDescribe the limitations of penetration testing and challenges for organizationsIdentify the role of human error in causing data breachesDescribe the role of end-user awareness in preventing cybersecurity attacks and during penetration testingDescribe user behavior analytics and why it is important during penetration testingIdentify tools for performing user behavior analytics
-
Identify how to translate penetration testing results into a formalized report that can be used for the end-user awareness programRecognize social engineering attacks and how to they relate to penetration testingDescribe how to perform social engineering penetration testingDescribe the goals of social engineering penetration testsDescribe tips and tricks for preventing social engineering attacksDescribe the role of human behavior in penetration testingSummarize the key concepts covered in this course
IN THIS COURSE
-
1m 39s
-
9m 27sLearn how to identify types of penetration tests and describe their reliance on end-user behavior. FREE ACCESS
-
9m 31sAfter completing this video, you will be able to describe the limitations of penetration testing and the challenges organizations face. FREE ACCESS
-
9m 25sIn this video, learn how to identify the role human error plays in causing data breaches. FREE ACCESS
-
8m 20sAfter completing this video, you will be able to describe the role of end-user awareness in preventing cybersecurity attacks and during penetration testing. FREE ACCESS
-
7m 13sAfter completing this video, you will be able to describe user behavior analytics and why it is important during a penetration test. FREE ACCESS
-
6m 29sFind out how to identify tools for performing user behavior analytics. FREE ACCESS
-
8m 38sIn this video, you will learn how to translate penetration testing results into a formalized report that can be used for the end-user awareness program. FREE ACCESS
-
8m 22sAfter completing this video, you will be able to recognize social engineering attacks and how they relate to penetration testing. FREE ACCESS
-
11m 34sAfter completing this video, you will be able to describe how to perform social engineering penetration tests. FREE ACCESS
-
6m 12sAfter completing this video, you will be able to describe the goals of social engineering penetration tests. FREE ACCESS
-
8m 32sUpon completion of this video, you will be able to describe tips and tricks for preventing social engineering attacks. FREE ACCESS
-
10m 34sAfter completing this video, you will be able to describe the role of human behavior in penetration testing. FREE ACCESS
-
1m 6s
EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE
Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.
Digital badges are yours to keep, forever.YOU MIGHT ALSO LIKE
Course
Pen Testing for Software Development: Penetration Testing SDLC, Team Structure, & Web Services
Rating 4.7 of 25 users
(25)