New Skills

New Training: Implementing Controls to Mitigate Attacks and Software Vulnerabilities

by Team Nuggets
New Training: Implement Modern Device Services picture: A
Published on February 24, 2021

In this 4-video skill, CBT Nuggets trainer John Munjoma discusses vulnerability controls. Watch this new CompTIA training.

Watch the full course: CompTIA Cybersecurity Analyst

This training includes:

  • 4 videos

  • 20 minutes of training

You’ll learn these topics in this skill:

  • Implementing Vulnerability Controls

  • Man in the Middle Attack

  • Attack Types

  • Mitigating Attacks and Software Vulnerabilities

What is a Man in the Middle Attack?

Unlike highly visible and publicized ransomware and phishing attacks, MITM attacks often get little fanfare in the public space, yet they remain a very serious threat by definition. A MITM attack occurs when the attacker positions themselves between a user and their desired destination (a site, saas application or other network resource) to either silently intercept data or impersonate a trusted resource to get further access to the network. MITM perpetrators have countless ways to achieve their goals :

  • Fake website to trick users into providing legitimate credentials.

  • Fake wi-fi spots in public locations to snoop on network traffic.

  • Snooping on email, chat or other forms of web communication.

There is no one solution to preventing MITM attacks, prevention should be part of a cohesive security strategy rather than just a suite of tools. Some of the ways organizations can prevent MITM attacks is to start by implementing strong password policies, enable MFA, prevent the use of open WI-FI or unsecured networks, enforce secure browsing by verifying SSL/TLS in websites being visited.



Recommended Articles