From the course: CCNA Cybersecurity (200-201) v1.2 Cert Prep
Unlock this course with a free trial
Join today to access over 25,300 courses taught by industry experts.
Social engineering attacks
From the course: CCNA Cybersecurity (200-201) v1.2 Cert Prep
Social engineering attacks
(bright music) - [Instructor] In this video, we're going to consider some common examples of social engineering attacks, and most of these fall under the category of hoaxes where an attacker is attempting to convince someone within an organization that that person in the organization, they're visiting a trusted website, they're using a safe application, they're granting access or they're giving confidential information to somebody that's authorized to receive that access or receive that information. First, consider phishing. You've probably received those emails claiming to be from a company or an organization that you would normally trust. Maybe it's your bank or a department in your country's government. And those emails might tell you something like, "You need to log in and reset your password, otherwise your account might not be secure," or they might try to create urgency saying something like, "Your account is going to be closed if you don't log in and update your profile." Now,…
Practice while you learn with exercise files
Download the files the instructor uses to teach the course. Follow along and learn by watching, listening and practicing.
Contents
-
-
-
-
(Locked)
Module 2: Threat detection and surveillance1m 13s
-
(Locked)
Attack surfaces1m 53s
-
(Locked)
Monitoring sources7m 8s
-
(Locked)
Data visibility comparison6m 25s
-
(Locked)
Categories of data types2m 54s
-
(Locked)
Denial-of-service (DoS) attacks5m 43s
-
Man-in-the-middle attacks9m 39s
-
(Locked)
Protocol-based attacks8m 12s
-
(Locked)
SQL injection attacks7m 25s
-
(Locked)
Cross-site scripting attacks5m 19s
-
(Locked)
Command injection attacks1m 26s
-
(Locked)
Social engineering attacks7m 43s
-
(Locked)
AI-based social engineering attacks2m 7s
-
(Locked)
Malware and ransomware attacks4m 22s
-
(Locked)
Buffer overflow attacks1m 49s
-
(Locked)
Command-and-control (C2) attacks2m 11s
-
(Locked)
Comparison of obfuscation techniques2m 3s
-
(Locked)
Encryption with digital certificates4m 21s
-
(Locked)
Digital certificate components7m 4s
-
(Locked)
-
-
-
-
-