You don't currently have access to this contentYou don't currently have access to this contentYou don't currently have access to this contentYou don't currently have access to this contentYou don't currently have access to this contentYou don't currently have access to this contentYou don't currently have access to this content
Information Security Premium Course

Hands-On Password Attacks And Security

Learn how attackers can bypass passwords and how you can prevent them from doing so.

Subscribe for Full Access

Get this course and all premium content for as low as $33/month.

Subscribe now

Course Overview

Passwords have become the top authentication factor in today’s world. You use it in combination with an email or username to sign into almost any service. Big Corporations like Google, Microsoft, Amazon, and Facebook still widely use passwords as an authentication mechanism today. But how secure are passwords?

This course focuses on the practical attacks that malicious users use to crack passwords, how you can use this attack in a penetration test, and how you can prevent them.

We will very briefly cover the basics of cryptography, hashing, and entropy and then immediately go on to crack different types of passwords using different methodologies.

What You
Will Learn

Inside
the ​Course

7 Lessons | 27 Topics | 7 Quizzes

Course Content

Expand All

Start Learning for as Little As $8 a Month!

Start Your FREE Two Week Trial

We are working day and night to bring you fresh courses every month. And we have brand new features in the works like guided career paths, hands-on labs and experiences, dedicated mentors, cyber range integration and so much more.

Related Courses

#
Featured Image for Business Continuity And Disaster Recovery Course.

Business Continuity And Disaster Recovery

#
Featured Image for Certified Information Systems Security Professional – CISSP Course.

Certified Information Systems Security Professional – CISSP

« » page 1 / 20