SecOps Tools and 2021 Security Incidents: Colonial Pipeline
Cybersecurity
| Intermediate
- 14 videos | 1h 15m 11s
- Includes Assessment
- Earns a Badge
Cybersecurity professionals often will be tasked with studying breaches that have impacted other organizations to protect their own assets. This knowledge helps to identify potential threats and understand how threat actors are operating in a modern environment. Begin this course by exploring the background of the Colonial Pipeline breach and how it was discovered. Then, examine how the data breach happened, focusing on credential harvesting methods typically used to capture login data. Next, investigate the different tools that could be used to conduct a similar type of attack, including Maltego CE, theHarvester, the Social-Engineer Toolkit and Zphisher. Finally, take a look at the cybersecurity community response and cybersecurity implications resulting from the Colonial Pipeline incident. Once you have completed this course, you will be able to use tools to conduct an attack similar to the Colonial Pipeline breach and identify potential threats to other organizations.
WHAT YOU WILL LEARN
-
Discover the key concepts covered in this courseOutline the basic background of the attack and what made it possibleOutline how the attack was discovered and disclosedDescribe the operation of the darkside ransomware groupDescribe how to gather information from potential targetsHarvest login credentials from the webIdentify tools that can be used for phishing and gathering open-source intelligence (osint)
-
Gather open-source intelligence using maltego community edition (maltego ce)Gather open-source intelligence using theharvesterConduct a phishing attack using the social-engineer toolkit (set)Conduct a phishing attack using the zphisher phishing toolDescribe colonial pipeline's response to the ransomware eventDescribe the political and cybersecurity fallout resulting from the ransomware eventSummarize the key concepts covered in this course
IN THIS COURSE
-
1m 9s
-
8m 27sBackground of the Attack FREE ACCESS
-
6m 15sAttack Discovery FREE ACCESS
-
6m 35sDarkSide Ransomware FREE ACCESS
-
6m 48sIntelligence Gathering FREE ACCESS
-
6m 55sCredential Harvesting FREE ACCESS
-
4m 13sPhishing & OSINT Tools FREE ACCESS
-
6m 14sGathering OSINT Using Maltego CE FREE ACCESS
-
4m 10sGathering OSINT Using theHarvester FREE ACCESS
-
5m 28sConducting a Phishing Attack Using SET FREE ACCESS
-
4m 27sConducting a Phishing Attack Using Zphisher FREE ACCESS
-
7m 29sColonial Pipeline Response FREE ACCESS
-
5m 58sColonial Pipeline Fallout FREE ACCESS
-
1m 3s
EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE
Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.
Digital badges are yours to keep, forever.