Threats, Vulnerabilities, and Mitigations for CompTIA Security+
Offered By: Pluralsight
Course Description
Overview
This course will teach you the essential concepts necessary to assess, articulate, and mitigate threats and vulnerabilities within your company as well and prepare you for the Security+ exam.
A successful career in cyber security is built upon a strong foundation of security concepts, tools and techniques. In this course, Threats, Vulnerabilities, and Mitigations for CompTIA Security+, you will learn how to identify and assess threats within your company and strengthen their security posture. Next, you’ll learn the common threat vectors and attack surfaces, along with the various types of vulnerabilities a bad actor is likely to try and exploit. Finally, you’ll learn the methods and best practices to mitigate those threats and vulnerabilities, hardening your network's infrastructure. When you’re finished with this course, you’ll have the concepts and knowledge necessary for the Security+ exam.
A successful career in cyber security is built upon a strong foundation of security concepts, tools and techniques. In this course, Threats, Vulnerabilities, and Mitigations for CompTIA Security+, you will learn how to identify and assess threats within your company and strengthen their security posture. Next, you’ll learn the common threat vectors and attack surfaces, along with the various types of vulnerabilities a bad actor is likely to try and exploit. Finally, you’ll learn the methods and best practices to mitigate those threats and vulnerabilities, hardening your network's infrastructure. When you’re finished with this course, you’ll have the concepts and knowledge necessary for the Security+ exam.
Syllabus
- Course Overview 1min
- Common Threat Actors and Motivations 14mins
- Common Threat Vectors and Attack Surfaces 27mins
- Types of Vulnerabilities 29mins
- Indicators of Malicious Activity 42mins
- Mitigation Techniques Used to Secure the Enterprise 21mins
- Domain Summary 3mins
Taught by
Pluralsight
Related Courses
Computer SecurityStanford University via Coursera Cryptography II
Stanford University via Coursera Malicious Software and its Underground Economy: Two Sides to Every Story
University of London International Programmes via Coursera Building an Information Risk Management Toolkit
University of Washington via Coursera Introduction to Cybersecurity
National Cybersecurity Institute at Excelsior College via Canvas Network