SecOps Tools and 2021 Security Incidents: Microsoft Exchange Server Data Breach

SecOps    |    Intermediate
  • 11 videos | 1h 13m 37s
  • Includes Assessment
  • Earns a Badge
Rating 4.5 of 4 users Rating 4.5 of 4 users (4)
Cybersecurity professionals are often tasked with studying breaches that have impacted other organizations to protect their assets. This knowledge helps them identify potential threats and understand how threat actors operate in a modern environment. In this course, explore the background of the Microsoft Exchange Server data breach, how it was discovered, and how Microsoft communicated about it. Review different tools that can be used to discover and exploit the vulnerability. Finally, explore how the cybersecurity community responded and how you can patch systems against such a breach. Upon completion of this course, you'll be able to describe the Microsoft Exchange Server data breach and how to detect it, as well as respond if you find a server that could be compromised by the same vulnerability.

WHAT YOU WILL LEARN

  • Discover the key concepts covered in this course
    Provide a summary of the ms exchange server attack and its impact
    Explain how the ms exchange server attack was discovered
    Summarize the public disclosure approach and notice
    Explain the different indicators of compromise
    List different tools that can be used to detect the exploit
  • Detect the exploit using nmap scripts
    Detect the vulnerability using powershell
    Exploit the vulnerability using metasploit
    Describe how to patch against the vulnerability and the overall response from the cybersecurity community
    Summarize the key concepts covered in this course

IN THIS COURSE

  • 1m 5s
  • 5m 5s
  • Locked
    3.  MS Exchange Server Data Breach Discovery
    7m 2s
  • Locked
    4.  How the Attack Was Disclosed Publicly
    8m 50s
  • Locked
    5.  What Was Compromised
    6m 34s
  • Locked
    6.  Tools for Detecting the Exploit
    7m 54s
  • Locked
    7.  Detecting Exploits Using Nmap
    9m 26s
  • Locked
    8.  Using Test-ProxyLogon.ps1 to Detect Vulnerability
    7m 25s
  • Locked
    9.  Using Metasploit to Exploit Vulnerability
    5m 59s
  • Locked
    10.  Patches and the Post-attack Response
    13m 20s
  • Locked
    11.  Course Summary
    57s

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE

Rating 4.8 of 16 users Rating 4.8 of 16 users (16)
Rating 4.5 of 12 users Rating 4.5 of 12 users (12)
Rating 5.0 of 2 users Rating 5.0 of 2 users (2)

PEOPLE WHO VIEWED THIS ALSO VIEWED THESE

Rating 4.5 of 39 users Rating 4.5 of 39 users (39)
Rating 4.3 of 139 users Rating 4.3 of 139 users (139)
Rating 4.5 of 441 users Rating 4.5 of 441 users (441)