CISM 2022: Common Network Security Attacks
Security technicians can benefit significantly by executing network security attacks in a controlled environment. This allows for an in-depth periodic review of security control efficacy related to IT networks.
In this course you will discover how networks can be scanned by attackers seeking potentially vulnerable services using free tools such as Nmap. You will then explore how attackers can compromise a user web browser how SQL injection attacks can reveal more information than intended by the app designer and how to configure a reverse shell where the compromised station reaches out to the attacker station often defeating standard firewall rule sets. Next you will learn how to spoof network traffic and execute a distributed denial-of-service (DDoS) attack. Lastly you will discover how to brute force a Windows remote desktop protocol (RDP) connection to gain access to a Windows host.
This course can be used to prepare for the Certified Information Security Manager (CISM) exam.