Vulnerabilities and Exploits
Beginner
- 12 videos | 50m 39s
- Includes Assessment
- Earns a Badge
Discover how common threat sources actually get exploited, in the world of web security. During this course, you will learn about white hat hackers, social engineers, phishing, social engineering attempts, exploit kits, ransomware, state sponsored hacking, and bug bounties. See how web-based applications have become more popular and what popularity means for data security. Look at Web Application Firewalls (WAFs), and how they protect web applications. Identify disaster recovery terms, such as BCP, DRP, RTO, and RPO. As a review exercise, you will describe how malicious users use tools to exploit vulnerabilities.
WHAT YOU WILL LEARN
-
Describe what white hat hackers are and how they can help ameliorate the security of a business or productDescribe what social engineering is and why it can be so dangerousSpecify how phishing can affect the security of a businessRecognize deceptive e-mail messagesDescribe how exploit kits can be used to take advantage of vulnerabilities in operating systems and applicationsDefine ransomware attacks and how they can affect sensitive data
-
Describe how the influence of governments in hacking incidents has become a large issue for it securitySpecify how bug bounties can help result in more exploits being found and fixedDescribe how web-based applications have gained more popularity and what implications for data security they haveDescribe how wafs can protect web applicationsList and define disaster recovery terms such as bcp, drp, rto, and rpoDsecribe how malicious users use tools to exploit vulnerabilities
IN THIS COURSE
-
2m 10sUpon completion of this video, you will be able to describe what white hat hackers are and how they can help improve the security of a business or product. FREE ACCESS
-
5m 3sUpon completion of this video, you will be able to describe what social engineering is and why it can be dangerous. FREE ACCESS
-
2m 29sUpon completion of this video, you will be able to specify how phishing can affect the security of a business. FREE ACCESS
-
5m 17sUpon completion of this video, you will be able to recognize e-mail messages that are deceptive. FREE ACCESS
-
5m 52sAfter completing this video, you will be able to describe how exploit kits can be used to take advantage of vulnerabilities in operating systems and applications. FREE ACCESS
-
4m 35sIn this video, you will learn about ransomware attacks and how they can affect sensitive data. FREE ACCESS
-
3m 33sUpon completion of this video, you will be able to describe how the influence of governments in hacking incidents has become a large issue for IT security. FREE ACCESS
-
1m 37sUpon completion of this video, you will be able to specify how bug bounties can help result in more exploits being found and fixed. FREE ACCESS
-
6m 15sAfter completing this video, you will be able to describe how web-based applications have gained more popularity and what implications for data security they have. FREE ACCESS
-
2m 54sUpon completion of this video, you will be able to describe how web application firewall can protect web applications. FREE ACCESS
-
6mUpon completion of this video, you will be able to list and define disaster recovery terms such as business continuity plan (BCP), disaster recovery plan (DRP), recovery time objective (RTO), and recovery point objective (RPO). FREE ACCESS
-
4m 56sIn this video, you will describe how malicious users use tools to exploit vulnerabilities. FREE ACCESS
EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE
Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.
Digital badges are yours to keep, forever.