Wenn Sie sich fĂĽr diesen Kurs anmelden, werden Sie auch fĂĽr diese Spezialisierung angemeldet.
Lernen Sie neue Konzepte von Branchenexperten
Gewinnen Sie ein Grundverständnis bestimmter Themen oder Tools
Erwerben Sie berufsrelevante Kompetenzen durch praktische Projekte
Erwerben Sie ein Berufszertifikat zur Vorlage
In diesem Kurs gibt es 4 Module
In this course, you'll continue developing your cybersecurity practitioner skills by implementing threat modeling and assessing the impact of reconnaissance and social engineering. Then, you'll assess the impact of a variety of different attack categories—system hacking attacks, web-based attacks, malware, hijacking and impersonation, denial-of-service (DoS) incidents, threats to mobile security, and threats to cloud security. You'll also analyze post-attack techniques like command and control (C2), persistence, lateral movement and pivoting, data exfiltration, and anti-forensics.
This is the second course in a multi-course Specialization.
All of the courses in this Specialization require that you purchase the CFR-410 LogicalLABS, which are interactive, browser-based virtual labs that simulate the activity environment. These labs are already set up with the data files, networking, and system configurations required to perform the activities. With the coupon code provided in the first course for 25% off, the labs cost approximately $60. If you already purchased the labs for the first course, you're all set.
Before threat actors launch their attack in earnest, they gather information. The information available to them is almost always a result of their target's behavior. The attacker simply does their own research, and suddenly they've made their job a lot easier. You need to analyze just what attackers can learn from your organization to get a better picture of what they'll attack, and how.
Das ist alles enthalten
1 LektĂĽre5 Plug-ins
Infos zu Modulinhalt anzeigen
1 Lektüre•Insgesamt 5 Minuten
Course Introduction•5 Minuten
5 Plug-ins•Insgesamt 115 Minuten
Lesson Introduction•5 Minuten
Implement Threat Modeling•50 Minuten
Assess the Impact of Reconnaissance•5 Minuten
Assess the Impact of Social Engineering•50 Minuten
Lesson Summary•5 Minuten
Analyzing Attacks on Computing and Network Environments
Modul 2•5 Stunden abzuschließen
Moduldetails
You've analyzed the general risks and threats to your systems, and you've identified how attackers can gather intelligence on these systems. Now you can begin to analyze the major attacks themselves. There's a wide variety of ways malicious users can compromise your operations, and it's vital you understand the potential effects of each one on the organization.
Das ist alles enthalten
9 Plug-ins
Infos zu Modulinhalt anzeigen
9 Plug-ins•Insgesamt 325 Minuten
Lesson Introduction•5 Minuten
Assess the Impact of System Hacking Attacks•45 Minuten
Assess the Impact of Web-Based Attacks•45 Minuten
Assess the Impact of Malware•45 Minuten
Assess the Impact of Hijacking and Impersonation Attacks•45 Minuten
Assess the Impact of DoS Incidents•45 Minuten
Assess the Impact of Threats to Mobile Security•45 Minuten
Assess the Impact of Threats to Cloud Security•45 Minuten
Lesson Summary•5 Minuten
Analyzing Post-Attack Techniques
Modul 3•4 Stunden abzuschließen
Moduldetails
After reconnaissance and attack, the last phase of the threat process is post-attack. In many cases, an attacker won't just withdraw once their attack is done; on the contrary, they'll want to stay in control of the systems they've compromised, continue to evade any countermeasures, and cover their tracks to avoid being identified. All of this means that, if you prematurely terminate your threat assessment efforts, they'll have gone to waste. Instead, you need to hone your focus on what an attacker does after an attack that can inflict long-lasting harm on your organization.
Das ist alles enthalten
7 Plug-ins
Infos zu Modulinhalt anzeigen
7 Plug-ins•Insgesamt 210 Minuten
Lesson Introduction•5 Minuten
Assess Command and Control Techniques•40 Minuten
Assess Persistence Techniques•40 Minuten
Assess Lateral Movement and Pivoting Techniques•40 Minuten
Assess Data Exfiltration Techniques•40 Minuten
Assess Anti-Forensics Techniques•40 Minuten
Lesson Summary•5 Minuten
Completing the Course
Modul 4•25 Minuten abzuschließen
Moduldetails
You'll wrap things up and then validate what you've learned in this course by taking an assessment.
Das ist alles enthalten
1 LektĂĽre1 Aufgabe
Infos zu Modulinhalt anzeigen
1 Lektüre•Insgesamt 5 Minuten
Course Summary•5 Minuten
1 Aufgabe•Insgesamt 20 Minuten
Course Summary•20 Minuten
Erwerben Sie ein Karrierezertifikat.
FĂĽgen Sie dieses Zeugnis Ihrem LinkedIn-Profil, Lebenslauf oder CV hinzu. Teilen Sie sie in Social Media und in Ihrer Leistungsbeurteilung.
CertNexus is a vendor-neutral certification body, providing emerging technology certifications and micro-credentials for Business, Data, Development, IT, and Security professionals. CertNexus’ exams meet the most rigorous development standards possible which outlines a global framework for developing personnel certification programs to narrow the widening skills gap.
When will I have access to the lectures and assignments?
To access the course materials, assignments and to earn a Certificate, you will need to purchase the Certificate experience when you enroll in a course. You can try a Free Trial instead, or apply for Financial Aid. The course may offer 'Full Course, No Certificate' instead. This option lets you see all course materials, submit required assessments, and get a final grade. This also means that you will not be able to purchase a Certificate experience.
What will I get if I subscribe to this Specialization?
When you enroll in the course, you get access to all of the courses in the Specialization, and you earn a certificate when you complete the work. Your electronic Certificate will be added to your Accomplishments page - from there, you can print your Certificate or add it to your LinkedIn profile.
Is financial aid available?
Yes. In select learning programs, you can apply for financial aid or a scholarship if you can’t afford the enrollment fee. If fin aid or scholarship is available for your learning program selection, you’ll find a link to apply on the description page.