New Training: Network-Based Attacks and Tools
| new skills - Team Nuggets

New Training: Network-Based Attacks and Tools

In this 8-video skill, CBT Nuggets trainer Bob Salmans takes a look at network based attacks used in penetration testing and what tools are used to carry them out. Watch this new CompTIA training.

Learn CompTIA with one of these courses:

This training includes:

  • 8 videos
  • 51 minutes of training

You’ll learn these topics in this skill:

  • How Attacks Against ARP Work
  • How DNS Cache Poisoning Works
  • DNS Cache Poisoning Attack
  • VLAN Hopping Attacks
  • Bypassing Network Access Control
  • Network Based Attacks Review
  • Network Based Attacks and Tools
  • ARP Poisoning Attack

3 Most Common Network Attacks

Network attacks occur when someone attempts to gain unauthorized access to an organization's network. These can either be passive (generally when data is stolen, but not otherwise manipulated) or active (when data is deleted, modified, or encrypted). These are some of the most commonly encountered types of network attacks:

Unauthorized access: Poor password management, weak passwords, social engineering, and compromised accounts are often doorways to allow unauthorized access to a network.

Distributed Denial of Service (DDoS): Hackers will gain access to large numbers of devices and use them to create a fleet of bots. They can then direct their traffic at a single target and overwhelm a network, forcing it to shut down.

Privilege Escalation: If a hacker can gain access to your network through a single account, he'll likely attempt to gain additional privileges in one of two ways. Horizontal escalation revolves around gaining access to additional accounts and vertical escalation involves a hacker gaining higher-level privileges for systems he's already accessed.

Download

Download

Ultimate Security Cert Guide

A 62-page guide to every Palo Alto, Offensive Security, (ISC)2, Check Point, CompTIA, and Cisco certification, and how they fit into your career.

I have read and understood the privacy policy, and am able to consent to it.