Exploitation and Mitigation: Ghostcat (CVE-2020-1938)

Cybrary
Course
Beta

If you're a cybersecurity practitioner that wants to know more about how to exploit and defend against Ghostcat (CVE-2020-1938), the you won't want to miss this course. You will be able to identify the vulnerability, attack it, and even mitigate it in a hands-on, secure lab environment. Don't let Ghostcat catch you off guard.

Time
1 hour 35 minutes
Difficulty
Intermediate
CEU/CPE
1
4.0
Share
Join over 3 million cybersecurity professionals advancing their career
Sign up with
or

Already have an account? Sign In »

Course Content
Module 1: Introduction and Background
Module 4: Summary
Course Description

Cybrary’s new Exploitation and Mitigation: Ghostcat (CVE-2020-1938) course gives experienced cybersecurity practitioners, in both offensive and defensive security roles, the opportunity to explore this potentially high-risk vulnerability. Our course explains and walks through the steps for identifying Ghostcat from the perspective of both the attacker and the defender, and demonstrates techniques for exploiting and mitigating the vulnerability.

Exploitation and Mitigation: Ghostcat (CVE-2020-1938) offers a unique learning experience by providing secure, browser-based virtual lab environments specifically designed for you to practice implementing techniques to identify, attack, and defend against Ghostcat.

Cybrary’s Exploitation and Mitigation: Ghostcat (CVE-2020-1938) course is best suited for penetration testers, cybersecurity analysts, and cybersecurity engineers familiar with basic networking and Linux system administration tasks as well as system administrators who possess an understanding of fundamental cybersecurity concepts.

Provider
Cybrary
Certificate of Completion
Certificate Of Completion

Complete this entire course to earn a Exploitation and Mitigation: Ghostcat (CVE-2020-1938) Certificate of Completion