New Training: Network-Based Attacks and Tools

In this 8-video skill, CBT Nuggets trainer Bob Salmans takes a look at network based attacks used in penetration testing and what tools are used to carry them out. Watch this new CompTIA training.
Learn CompTIA with one of these courses:
This training includes:
8 videos
51 minutes of training
You’ll learn these topics in this skill:
How Attacks Against ARP Work
How DNS Cache Poisoning Works
DNS Cache Poisoning Attack
VLAN Hopping Attacks
Bypassing Network Access Control
Network Based Attacks Review
Network Based Attacks and Tools
ARP Poisoning Attack
3 Most Common Network Attacks
Network attacks occur when someone attempts to gain unauthorized access to an organization's network. These can either be passive (generally when data is stolen, but not otherwise manipulated) or active (when data is deleted, modified, or encrypted). These are some of the most commonly encountered types of network attacks:
Unauthorized access: Poor password management, weak passwords, social engineering, and compromised accounts are often doorways to allow unauthorized access to a network.
Distributed Denial of Service (DDoS): Hackers will gain access to large numbers of devices and use them to create a fleet of bots. They can then direct their traffic at a single target and overwhelm a network, forcing it to shut down.
Privilege Escalation: If a hacker can gain access to your network through a single account, he'll likely attempt to gain additional privileges in one of two ways. Horizontal escalation revolves around gaining access to additional accounts and vertical escalation involves a hacker gaining higher-level privileges for systems he's already accessed.
delivered to your inbox.
By submitting this form you agree to receive marketing emails from CBT Nuggets and that you have read, understood and are able to consent to our privacy policy.