Attacks, Threats, and Vulnerabilities for CompTIA Security+
Offered By: Pluralsight
Course Description
Overview
This course will teach you the fundamentals and key concepts around the
threats, attacks, and vulnerabilities your organization is likely to face.
More importantly you’re learn how to mitigate those risks and protect your organization.
In this course, you’ll learn about the various threats faced by social engineering techniques like phishing, pharming, and identity fraud. First, you’ll learn about potential indicators of compromise used to determine the types of attack to systems, applications, and networks. Next, you’ll discover the various intelligence sources used to identify and combat these threats. Finally, you’ll become familiar with various penetration testing tools and techniques. When you’re finished with this course, you’ll have the skills and knowledge needed to pass the Threats, Attacks, and Vulnerabilities section of Security+, along with the skills needed to help protect your company from attacks both internal and external.
threats, attacks, and vulnerabilities your organization is likely to face.
More importantly you’re learn how to mitigate those risks and protect your organization.
In this course, you’ll learn about the various threats faced by social engineering techniques like phishing, pharming, and identity fraud. First, you’ll learn about potential indicators of compromise used to determine the types of attack to systems, applications, and networks. Next, you’ll discover the various intelligence sources used to identify and combat these threats. Finally, you’ll become familiar with various penetration testing tools and techniques. When you’re finished with this course, you’ll have the skills and knowledge needed to pass the Threats, Attacks, and Vulnerabilities section of Security+, along with the skills needed to help protect your company from attacks both internal and external.
Syllabus
- Course Overview 1min
- Comparing Different Types of Social Engineering Techniques 48mins
- Analyzing Malware and Other Attacks 49mins
- Recognizing Application Attacks 39mins
- Identifying Network Attacks 37mins
- Distinguishing Threat Actors, Vectors, and Intelligence Sources 40mins
- Understanding Vulnerabilities and Security Risks 34mins
- Defining Security Assessment Techniques 35mins
- Defining Penetration Testing 23mins
Taught by
Christopher Rees
Related Courses
Network SecurityGeorgia Institute of Technology via Udacity Privacy and Security in Online Social Media
Indian Institute of Technology Delhi via Swayam The Absolute Beginners Guide to Cyber Security 2024 - Part 1
Udemy Offensive Security Engineering
Udemy Cyber Security Foundations: Common Malware Attacks and Defense Strategies
EC-Council via FutureLearn