A weakness is only a weakness if the enemy knows about it — and as a pentester, it’s your job to play the enemy. In this course, four videos will reintroduce you to the art of exploiting network and application vulnerabilities. Take a closer look at man-in-the-middle attacks, Denial-of-Service (DoS) and Distributed-Denial-of-Service (DDoS), evil twin attacks, credential harvesting and the weak points in networks, wireless networks and applications. Includes definitions and demonstrations.
Network-Based VulnerabilitiesDuration: 13:46
Wireless-based VulnerabilitiesDuration: 8:46
Wireless Network Attack DemonstrationDuration: 5:50
Application-Based VulnerabilitiesDuration: 18:52
Meet the author
Jason Dion specializes in providing actionable information you can use to further your cybersecurity and information technology career. His IT certification and training courses teach you real-world application of the skills needed to face today's cybersecurity challenges.
Dion is an instructor at Liberty University’s College of Engineering and Computational Science and Anne Arundel Community College’s Department of Computing Technologies with multiple information technology professional certifications, including Certified Information Systems Security Professional (CISSP), Certified Ethical Hacker (CEH), Certified Network Defense Architect (CNDA), Digital Forensic Examiner (DFE), Digital Media Collector (DMC), Security+, Network+, A+, PRINCE2, PRINCE2 Agile and ITIL.
You're in good company
"Comparing Infosec to other vendors is like comparing apples to oranges. My instructor was hands-down the best I’ve had."
"I knew Infosec could tell me what to expect on the exam and what topics to focus on most."
"I’ve taken five boot camps with Infosec and all my instructors have been great."