New Training: Implementing Controls to Mitigate Attacks and Software Vulnerabilities

In this 4-video skill, CBT Nuggets trainer John Munjoma discusses vulnerability controls. Watch this new CompTIA training.
Watch the full course: CompTIA Cybersecurity Analyst
This training includes:
4 videos
20 minutes of training
You’ll learn these topics in this skill:
Implementing Vulnerability Controls
Man in the Middle Attack
Attack Types
Mitigating Attacks and Software Vulnerabilities
What is a Man in the Middle Attack?
Unlike highly visible and publicized ransomware and phishing attacks, MITM attacks often get little fanfare in the public space, yet they remain a very serious threat by definition. A MITM attack occurs when the attacker positions themselves between a user and their desired destination (a site, saas application or other network resource) to either silently intercept data or impersonate a trusted resource to get further access to the network. MITM perpetrators have countless ways to achieve their goals :
Fake website to trick users into providing legitimate credentials.
Fake wi-fi spots in public locations to snoop on network traffic.
Snooping on email, chat or other forms of web communication.
There is no one solution to preventing MITM attacks, prevention should be part of a cohesive security strategy rather than just a suite of tools. Some of the ways organizations can prevent MITM attacks is to start by implementing strong password policies, enable MFA, prevent the use of open WI-FI or unsecured networks, enforce secure browsing by verifying SSL/TLS in websites being visited.
delivered to your inbox.
By submitting this form you agree to receive marketing emails from CBT Nuggets and that you have read, understood and are able to consent to our privacy policy.