Pen Testing: End-user Behavior


Overview/Description
Expected Duration
Lesson Objectives
Course Number
Expertise Level



Overview/Description
Explore penetration testing, its limitations, and how end-user behavior affects this process in this 14-video course, which examines several types of penetration testing, the reliance on end-user behavior, and the challenges facing organizations. You will explore the role of human error in causing data breaches, user awareness, preventing attacks, and how to use end-user analytics. You will learn to use tools to perform user behavior analytics, and how to use test results to create and communicate reports. Next, learners will examine how to create a plan for organizations to check user behavior when a threat is received, and explore the need for cybersecurity training for employees. You will learn to use advanced analytics that focus on user activity instead of specific static threat indicators to detect anomalies or malicious behavior. You will explore social engineering attacks, how to perform a social engineering penetration test, and how to counter social engineering attacks. Finally, examine the role played by human behavior in penetration testing.  

Expected Duration (hours)
1.8

Lesson Objectives

Pen Testing: End-user Behavior

  • discover the key concepts covered in this course
  • identify penetration testing types and describe their reliance on end-user behavior
  • describe the limitations of penetration testing and challenges for organizations
  • identify the role of human error in causing data breaches
  • describe the role of end-user awareness in preventing cybersecurity attacks and during penetration testing
  • describe user behavior analytics and why it is important during penetration testing
  • identify tools for performing user behavior analytics
  • identify how to translate penetration testing results into a formalized report that can be used for the end-user awareness program
  • recognize social engineering attacks and how to they relate to penetration testing
  • describe how to perform social engineering penetration testing
  • describe the goals of social engineering penetration tests
  • describe tips and tricks for preventing social engineering attacks
  • describe the role of human behavior in penetration testing
  • summarize the key concepts covered in this course
  • Course Number:
    it_soptebdj_01_enus

    Expertise Level
    Intermediate