End-User Security: Securing End Users against Attackers


Overview/Description
Expected Duration
Lesson Objectives
Course Number
Expertise Level



Overview/Description

This 10-video course examines end-user security from the rogue attacker point of view, including motivations, Malware-as-a-Service (MaaS) phishing techniques, pharming, ransomware, data theft, cryptojacking, denial-of-service (DoS), and toolkits. One of the first things to do to be successful as a security technician or practitioner is to start to understand the mind of the attacker, so you will examine the possible motives for attacking user endpoints. You will then take a look at Malware-as-a-Service, which is available all over the world. You will explore the phishing techniques an attacker might take, as they are becoming stealthier, sending phishing e-mails over varied infrastructures. Delve into ransomware, this time from the attacker's perspective, and learn about data breaches and theft. You will also examine cryptojacking, what it is and explore some examples, and have a look at DoS and distributed-denial-of-service (DdoS) attacks using, for example, botnets. The final tutorial surveys common exploit kits such as Kali Linux and Metasploit. The concluding exercise entails listing common motives for attacking endpoints, common ransomware payloads, and exploit kits.



Expected Duration (hours)
0.6

Lesson Objectives

End-User Security: Securing End Users against Attackers

  • discover the key concepts covered in this course
  • describe attack motivation
  • define malware-as-a-service
  • compare phishing techniques
  • describe ransomware
  • describe data breaches and theft
  • define cryptojacking
  • describe DoS and DDoS attacks
  • compare common exploit kits
  • list common motives for attacking endpoints, common ransomware payloads, and exploit kits
  • Course Number:
    it_saeusadj_03_enus

    Expertise Level
    Beginner