Security Vulnerabilities: Managing Threats & Vulnerabilities
Beginner
- 14 videos | 52m 56s
- Includes Assessment
- Earns a Badge
This 14-video course helps learners explore the threat categories in the STRIDE (Spoofing, Tampering, Repudiation, Information Disclosure, Denial of Service, and Elevation of Privilege) model for identifying computer security threats, including spoofing, tampering, repudiation, information disclosure, denial of service (DoS), and escalation of privilege. Key concepts covered in this course include categories of security vulnerabilities using the STRIDE model; how to recognize authenticity and identity spoofing threats; and how to validate integrity and tampering threats. Next, you will learn about authentication threats and non-repudiation, when used in security, for example, when a charge cannot be challenged; learn information threats such as privacy breaches or data leaks; and learn the threat of DoS attacks, a resource disruption attack when a user tries to connect. Learners continue by exploring the privilege escalation threat model; learning to recognize examples of security misconfiguration threats; and observing methods of brute force attacks and key sizes. Finally, learn to perform a local network scan and a targeted remote scan by using Nmap; and learn to perform a DoS vulnerability diagnostic test on a host.
WHAT YOU WILL LEARN
-
Discover the key concepts covered in this courseDescribe the categories of vulnerabilities using the stride modelDescribe authenticity and identity spoofing threatsDescribe how to validate integrity and tampering threatsDescribe authentication threats and non-repudiationDescribe information threats such as privacy breaches or data leaksDescribe the threat of denial of service attacks
-
Describe the privilege escalation threat modelRecognize examples of security misconfiguration threatsDescribe methods of brute force attacks and key sizesPerform a local network scan using nmapPerform a targeted remote scan using nmapPerform a dos vulnerability diagnostic test on a hostSummarize the key concepts covered in this course
IN THIS COURSE
-
1m 22s
-
4m 5sUpon completion of this video, you will be able to describe the categories of vulnerabilities using the STRIDE model. FREE ACCESS
-
5m 45sAfter completing this video, you will be able to describe authenticity and identity spoofing threats. FREE ACCESS
-
4m 54sAfter completing this video, you will be able to describe how to validate integrity and tampering threats. FREE ACCESS
-
3m 56sAfter completing this video, you will be able to describe authentication threats and non-repudiation. FREE ACCESS
-
4m 14sAfter completing this video, you will be able to describe information threats such as privacy breaches or data leaks. FREE ACCESS
-
3m 41sAfter watching this video, you will be able to describe the threat of denial of service attacks. FREE ACCESS
-
3m 22sUpon completion of this video, you will be able to describe the threat model for privilege escalation. FREE ACCESS
-
3m 17sAfter completing this video, you will be able to recognize examples of security misconfiguration threats. FREE ACCESS
-
3m 40sAfter completing this video, you will be able to describe methods of brute force attacks and key sizes. FREE ACCESS
-
4m 52sIn this video, find out how to scan your local network using Nmap. FREE ACCESS
-
4m 22sIn this video, you will learn how to perform a targeted remote scan using Nmap. FREE ACCESS
-
4m 28sIn this video, you will learn how to perform a diagnostic test for vulnerabilities to a DOS attack on a host. FREE ACCESS
-
57s
EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE
Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.
Digital badges are yours to keep, forever.