Attacks, Threats, and Vulnerabilities for CompTIA Security+
Offered By: Pluralsight
Course Description
Overview
This course will teach you the fundamentals and key concepts around the
threats, attacks, and vulnerabilities your organization is likely to face.
More importantly you’re learn how to mitigate those risks and protect your organization.
In this course, you’ll learn about the various threats faced by social engineering techniques like phishing, pharming, and identity fraud. First, you’ll learn about potential indicators of compromise used to determine the types of attack to systems, applications, and networks. Next, you’ll discover the various intelligence sources used to identify and combat these threats. Finally, you’ll become familiar with various penetration testing tools and techniques. When you’re finished with this course, you’ll have the skills and knowledge needed to pass the Threats, Attacks, and Vulnerabilities section of Security+, along with the skills needed to help protect your company from attacks both internal and external.
threats, attacks, and vulnerabilities your organization is likely to face.
More importantly you’re learn how to mitigate those risks and protect your organization.
In this course, you’ll learn about the various threats faced by social engineering techniques like phishing, pharming, and identity fraud. First, you’ll learn about potential indicators of compromise used to determine the types of attack to systems, applications, and networks. Next, you’ll discover the various intelligence sources used to identify and combat these threats. Finally, you’ll become familiar with various penetration testing tools and techniques. When you’re finished with this course, you’ll have the skills and knowledge needed to pass the Threats, Attacks, and Vulnerabilities section of Security+, along with the skills needed to help protect your company from attacks both internal and external.
Syllabus
- Course Overview 1min
- Comparing Different Types of Social Engineering Techniques 48mins
- Analyzing Malware and Other Attacks 49mins
- Recognizing Application Attacks 39mins
- Identifying Network Attacks 37mins
- Distinguishing Threat Actors, Vectors, and Intelligence Sources 40mins
- Understanding Vulnerabilities and Security Risks 34mins
- Defining Security Assessment Techniques 35mins
- Defining Penetration Testing 23mins
Taught by
Christopher Rees
Related Courses
The Foundations of CybersecurityUniversity System of Georgia via Coursera Cloud and Automation for CompTIA CySA+
Pluralsight Cyber Security Crash Course for Beginners:Learn From Scratch
Udemy Lei geral de Proteção de Dados Pessoais na Prática
Udemy Managing Data Security and Policy in Microsoft Azure
Pluralsight