Pen Testing: End-user Behavior

IT Security    |    Intermediate
  • 14 videos | 1h 47m 2s
  • Includes Assessment
  • Earns a Badge
Rating 4.5 of 67 users Rating 4.5 of 67 users (67)
Explore penetration testing, its limitations, and how end-user behavior affects this process in this 14-video course, which examines several types of penetration testing, the reliance on end-user behavior, and the challenges facing organizations. You will explore the role of human error in causing data breaches, user awareness, preventing attacks, and how to use end-user analytics. You will learn to use tools to perform user behavior analytics, and how to use test results to create and communicate reports. Next, learners will examine how to create a plan for organizations to check user behavior when a threat is received, and explore the need for cybersecurity training for employees. You will learn to use advanced analytics that focus on user activity instead of specific static threat indicators to detect anomalies or malicious behavior. You will explore social engineering attacks, how to perform a social engineering penetration test, and how to counter social engineering attacks. Finally, examine the role played by human behavior in penetration testing.

WHAT YOU WILL LEARN

  • Discover the key concepts covered in this course
    Identify penetration testing types and describe their reliance on end-user behavior
    Describe the limitations of penetration testing and challenges for organizations
    Identify the role of human error in causing data breaches
    Describe the role of end-user awareness in preventing cybersecurity attacks and during penetration testing
    Describe user behavior analytics and why it is important during penetration testing
    Identify tools for performing user behavior analytics
  • Identify how to translate penetration testing results into a formalized report that can be used for the end-user awareness program
    Recognize social engineering attacks and how to they relate to penetration testing
    Describe how to perform social engineering penetration testing
    Describe the goals of social engineering penetration tests
    Describe tips and tricks for preventing social engineering attacks
    Describe the role of human behavior in penetration testing
    Summarize the key concepts covered in this course

IN THIS COURSE

  • 1m 39s
  • 9m 27s
    Learn how to identify types of penetration tests and describe their reliance on end-user behavior. FREE ACCESS
  • Locked
    3.  Penetration Testing Weaknesses
    9m 31s
    After completing this video, you will be able to describe the limitations of penetration testing and the challenges organizations face. FREE ACCESS
  • Locked
    4.  Human Error Data Breaches
    9m 25s
    In this video, learn how to identify the role human error plays in causing data breaches. FREE ACCESS
  • Locked
    5.  End-user Awareness
    8m 20s
    After completing this video, you will be able to describe the role of end-user awareness in preventing cybersecurity attacks and during penetration testing. FREE ACCESS
  • Locked
    6.  User Behavior Analytics
    7m 13s
    After completing this video, you will be able to describe user behavior analytics and why it is important during a penetration test. FREE ACCESS
  • Locked
    7.  User Behavior Analytics Tools
    6m 29s
    Find out how to identify tools for performing user behavior analytics. FREE ACCESS
  • Locked
    8.  Penetration Testing Report
    8m 38s
    In this video, you will learn how to translate penetration testing results into a formalized report that can be used for the end-user awareness program. FREE ACCESS
  • Locked
    9.  Social Engineering Attacks
    8m 22s
    After completing this video, you will be able to recognize social engineering attacks and how they relate to penetration testing. FREE ACCESS
  • Locked
    10.  Social Engineering Pen Testing
    11m 34s
    After completing this video, you will be able to describe how to perform social engineering penetration tests. FREE ACCESS
  • Locked
    11.  Social Engineering Goals
    6m 12s
    After completing this video, you will be able to describe the goals of social engineering penetration tests. FREE ACCESS
  • Locked
    12.  Social Engineering Countermeasures
    8m 32s
    Upon completion of this video, you will be able to describe tips and tricks for preventing social engineering attacks. FREE ACCESS
  • Locked
    13.  Human Behavior Penetration Testing
    10m 34s
    After completing this video, you will be able to describe the role of human behavior in penetration testing. FREE ACCESS
  • Locked
    14.  Course Summary
    1m 6s

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE

Rating 4.4 of 5 users Rating 4.4 of 5 users (5)
Rating 5.0 of 3 users Rating 5.0 of 3 users (3)
Rating 4.7 of 35 users Rating 4.7 of 35 users (35)

PEOPLE WHO VIEWED THIS ALSO VIEWED THESE

Rating 4.6 of 21 users Rating 4.6 of 21 users (21)
Rating 4.2 of 18 users Rating 4.2 of 18 users (18)
Rating 4.5 of 1341 users Rating 4.5 of 1341 users (1341)