New Training: Implementing Controls to Mitigate Attacks and Software Vulnerabilities
| new skills - Team Nuggets

New Training: Implementing Controls to Mitigate Attacks and Software Vulnerabilities

In this 4-video skill, CBT Nuggets trainer John Munjoma discusses vulnerability controls. Watch this new CompTIA training.

Watch the full course: CompTIA Cybersecurity Analyst

This training includes:

  • 4 videos
  • 20 minutes of training

You’ll learn these topics in this skill:

  • Implementing Vulnerability Controls
  • Man in the Middle Attack
  • Attack Types
  • Mitigating Attacks and Software Vulnerabilities

What is a Man in the Middle Attack?

Unlike highly visible and publicized ransomware and phishing attacks, MITM attacks often get little fanfare in the public space, yet they remain a very serious threat by definition. A MITM attack occurs when the attacker positions themselves between a user and their desired destination (a site, saas application or other network resource) to either silently intercept data or impersonate a trusted resource to get further access to the network. MITM perpetrators have countless ways to achieve their goals :

  • Fake website to trick users into providing legitimate credentials.
  • Fake wi-fi spots in public locations to snoop on network traffic.
  • Snooping on email, chat or other forms of web communication.

There is no one solution to preventing MITM attacks, prevention should be part of a cohesive security strategy rather than just a suite of tools. Some of the ways organizations can prevent MITM attacks is to start by implementing strong password policies, enable MFA, prevent the use of open WI-FI or unsecured networks, enforce secure browsing by verifying SSL/TLS in websites being visited.

Download

Download

Ultimate Security Cert Guide

A 62-page guide to every Palo Alto, Offensive Security, (ISC)2, Check Point, CompTIA, and Cisco certification, and how they fit into your career.

I have read and understood the privacy policy, and am able to consent to it.