Attacks, Threats, and Vulnerabilities for CompTIA Security+
Offered By: Pluralsight
Course Description
Overview
This course will teach you the fundamentals and key concepts around the
threats, attacks, and vulnerabilities your organization is likely to face.
More importantly you’re learn how to mitigate those risks and protect your organization.
In this course, you’ll learn about the various threats faced by social engineering techniques like phishing, pharming, and identity fraud. First, you’ll learn about potential indicators of compromise used to determine the types of attack to systems, applications, and networks. Next, you’ll discover the various intelligence sources used to identify and combat these threats. Finally, you’ll become familiar with various penetration testing tools and techniques. When you’re finished with this course, you’ll have the skills and knowledge needed to pass the Threats, Attacks, and Vulnerabilities section of Security+, along with the skills needed to help protect your company from attacks both internal and external.
threats, attacks, and vulnerabilities your organization is likely to face.
More importantly you’re learn how to mitigate those risks and protect your organization.
In this course, you’ll learn about the various threats faced by social engineering techniques like phishing, pharming, and identity fraud. First, you’ll learn about potential indicators of compromise used to determine the types of attack to systems, applications, and networks. Next, you’ll discover the various intelligence sources used to identify and combat these threats. Finally, you’ll become familiar with various penetration testing tools and techniques. When you’re finished with this course, you’ll have the skills and knowledge needed to pass the Threats, Attacks, and Vulnerabilities section of Security+, along with the skills needed to help protect your company from attacks both internal and external.
Syllabus
- Course Overview 1min
- Comparing Different Types of Social Engineering Techniques 48mins
- Analyzing Malware and Other Attacks 49mins
- Recognizing Application Attacks 39mins
- Identifying Network Attacks 37mins
- Distinguishing Threat Actors, Vectors, and Intelligence Sources 40mins
- Understanding Vulnerabilities and Security Risks 34mins
- Defining Security Assessment Techniques 35mins
- Defining Penetration Testing 23mins
Taught by
Christopher Rees
Related Courses
Cyber Security Foundations: Common Malware Attacks and Defense StrategiesEC-Council via FutureLearn Cyber Security Incident Response for Managers
PA Consulting via FutureLearn Cybersecurity in Healthcare (Hospitals & Care Centres)
Erasmus University Rotterdam via Coursera Avoiding Phishing Scams
LinkedIn Learning Become an Ethical Hacker
LinkedIn Learning