Companies Home Search Profile

Security Threats, Attacks, and Vulnerabilities Online Training

Focused View

Keith Barker

6:29:31

51 View
  • 1. Social Engineering Techniques.mp4
    02:02
  • 2. Phishing and Related Attacks.mp4
    05:50
  • 3. Low Tech Attacks.mp4
    05:32
  • 4. Why Social Engineering Works.mp4
    04:36
  • 5. The Top Social Engineering Tool.mp4
    07:02
  • 6. Identifying a Phishing Email.mp4
    10:10
  • 7. Social Engineering Toolkit.mp4
    07:48
  • 8. Review Quiz.mp4
    04:59
  • 9. Introduction to Cyber Attack Techniques.mp4
    00:39
  • 10. Malware.mp4
    08:07
  • 11. Password Attacks.mp4
    06:11
  • 12. Password Attack Example.mp4
    10:22
  • 13. Cyber Physical Components.mp4
    05:01
  • 14. Adversarial AI.mp4
    04:19
  • 15. Supply Chain Security.mp4
    02:07
  • 16. Cryptographic Attacks.mp4
    04:19
  • 17. Review Quiz.mp4
    07:56
  • 18. Introduction to Application Attacks.mp4
    00:46
  • 19. Injection Attacks.mp4
    03:17
  • 20. Cross Site Scripting.mp4
    02:32
  • 21. Poorly Written Apps.mp4
    05:32
  • 22. Overflow Attack Demo.mp4
    08:15
  • 23. Poorly Written App Attack.mp4
    04:08
  • 24. Impersonation.mp4
    03:19
  • 25. Error Handling Attack.mp4
    07:02
  • 26. Additional Application Attacks.mp4
    04:11
  • 27. Password Recovery Fail.mp4
    04:12
  • 28. Review Quiz.mp4
    06:25
  • 29. Introduction to Network Attacks.mp4
    00:45
  • 30. Wireless Attacks.mp4
    06:33
  • 31. In-line On-path Attacks.mp4
    06:22
  • 32. Layer 2 attacks.mp4
    07:58
  • 33. Domain name system (DNS).mp4
    05:52
  • 34. Distributed denial-of-service (DDoS).mp4
    04:20
  • 35. Malicious code or script execution.mp4
    02:05
  • 36. Remediation Options.mp4
    05:31
  • 37. Review Quiz.mp4
    08:11
  • 38. Introduction to Actors, Vectors, and Intelligence Sources.mp4
    00:55
  • 39. Threat Actors.mp4
    06:29
  • 40. Attack Vectors.mp4
    06:59
  • 41. Threat Intelligence Sources.mp4
    09:36
  • 42. Threat Maps.mp4
    12:13
  • 43. Additional Sources for Research.mp4
    04:29
  • 44. Review Quiz.mp4
    06:09
  • 45. Introduction to Vulnerabilities and Security Risks -.mp4
    01:07
  • 46. Cloud vs. On-prem Vulnerabilities.mp4
    02:42
  • 47. Zero-day Attacks.mp4
    03:07
  • 48. Weak Configurations.mp4
    09:19
  • 49. Telnet with IPsec Demonstration.mp4
    09:38
  • 50. Third-Party Risks.mp4
    02:48
  • 51. Patch Management.mp4
    04:29
  • 52. Vulnerabilities Review Quiz.mp4
    13:32
  • 53. Introduction to Security Assessments.mp4
    01:53
  • 54. Vulnerability Scan Overview.mp4
    06:20
  • 55. Network Scan Demonstration.mp4
    08:34
  • 56. Positive and Negative Scan Results.mp4
    03:16
  • 57. CVE and CVSS.mp4
    05:05
  • 58. Security information and event management (SIEM).mp4
    05:07
  • 59. Threat hunting.mp4
    02:43
  • 60. Security orchestration, automation, and response (SOAR).mp4
    02:43
  • 61. Security Assessment Review Quiz.mp4
    11:49
  • 62. Introduction to Penetration Testing.mp4
    01:11
  • 63. Pen Testing Overview.mp4
    10:58
  • 64. OSSTMM.mp4
    03:17
  • 65. Resources from NIST.mp4
    04:38
  • 66. Penetration Testing Execution Standard.mp4
    04:11
  • 67. Pen Testing Demo.mp4
    14:23
  • 68. OWASP.mp4
    04:26
  • 69. Security Team Exercises.mp4
    02:03
  • 70. Pen Testing Review Quiz.mp4
    09:06
  • Description


    This foundational security training prepares security technicians to recognize, compare, and contrast different types of cybersecurity vulnerabilities and threats and indicators associated with network attacks.

    Whether you're on your way to earning your CompTIA Security+ certification, working toward a different cybersecurity cert, or just trying to expand your knowledge of digital network security, this training represents a crucial first step in your journey.

    More details


    You can't keep a computer network or system safe if you don't know what a threat to the system looks like, how different attacks work, or what your network's unique vulnerabilities are. Now you can: learn social engineering techniques, different types of attacks, and network vulnerabilities.

    This Security Threats, Attacks and Vulnerabilities training is derived from the first of CompTIA Security+ certification exam's five exam objectives and will prepare you in the broadest way possible.

    After finishing the videos in this Security Threats, Attacks, and Vulnerabilities training, you'll know how to recognize, compare, and contrast different types of cybersecurity vulnerabilities and threats and indicators associated with network attacks.

    For anyone with security technicians on their team, this CompTIA training can be used to onboard new security technicians, curated into individual or team training plans, or as a CompTIA reference resource.

    Security Threats, Attacks, and Vulnerabilities: What You Need to Know

    For any security technician looking to improve their proficiency with basic security concepts, this CompTIA course covers topics such as:

    • Comparing and contrasting different types of social engineering techniques
    • Determining the type of attack, given certain indicators
    • Recognizing application attacks like injections, cross-site scripting, and more
    • Understanding the range of options network attackers have for infiltration and penetration

    Who Should Take Security Threats, Attacks, and Vulnerabilities Training?

    This Security Threats, Attacks, and Vulnerabilities training is considered associate-level CompTIA training, which means it was designed for security technicians with 1 to 3 years of experience -- or no experience at all. This security course is valuable for new or aspiring IT professionals, experienced security technicians looking to validate foundational skills, and non-technical professionals.

    Basic security concepts user training. Don't make the mistake of assuming this Security Threats, Attacks and Vulnerabilities training is best for IT professionals. Network and system security professionals are constantly immersed in threats and solutions — it's the people who don't normally work with cybersecurity who need to recognize hacking attempts or spot wireless vulnerabilities. That's how an organization and its networks are kept safe.

    New or aspiring IT professionals. If you're a brand new security technician, or you're looking for a chance to break into that career field, consider starting your career off on the right foot with this Security Threats, Attacks and Vulnerabilities training. It's a perfect primer for the many different approaches a hostile actor might take to try and break into your networks. Learning this material early will set you up for long-term success in your cybersecurity career.

    User Reviews
    Rating
    0
    0
    0
    0
    0
    average 0
    Total votes0
    Focused display
    Keith Barker
    Keith Barker
    Instructor's Courses

    The best part of being a trainer is making a difference in the life of a student. When a motivated learner and the correct training meet at the right time, the results are amazing.

    Keith Barker discovered a love for computers and networking in 1984 and began his IT career in 1985 at Electronic Data Systems (EDS). He has worked with companies including Paramount Pictures, Blue Cross, and several government agencies. Keith loves to teach and spends most of his time creating fun and useful videos for CBT Nuggets.

    Certifications: Cisco CCIE (2x), CISSP, Network+, Security+, VMware, Palo Alto, Check Point

    Areas of expertise: Networking and Security

    CBT Nuggets is renowned for providing innovative training that's informative, meaningful, and engaging. We provide a variety of training, primarily in IT, project management, and office productivity topics. Our comprehensive library contains thousands of training videos ranging from Cisco networking to Microsoft Word. Whether you want to pass a certification exam, increase your skills, or simply learn new things, we've got you covered! All of our training is delivered through high-quality online streaming video. Subscribers can train 24 hours a day, seven days a week, from the convenience of a computer or mobile device. CBT Nuggets trainers are the rock stars of training, renowned for their expertise, industry-wide credibility, and engaging personalities. They enable CBT Nuggets to deliver accurate, up-to-date training, using a laid-back whiteboard presentation style. There are no scripts, EVER. Our trainers love to teach, and it shows! CEO and founder Dan Charbonneau was a Microsoft trainer when he began recording CBT Nuggets' very first training videos back in the 1990s. He wanted to help provide large organizations, small teams and individuals with comprehensive and budget-conscious training, and he realized it couldn't be done in a classroom. From the CBT Nuggets World Headquarters in Eugene, Oregon, Dan and his team promise each video will be informative, comprehensive, accurate, and fun to watch.
    • language english
    • Training sessions 70
    • duration 6:29:31
    • Release Date 2023/07/17

    Courses related to Cyber Security

    Subtitle
    Security Controls: CIS Controls
    Pluralsight Bobby Rogers
    Bobby Rogers
    Security Controls: CIS Controls
    1:32:37
    English subtitles
    05/13/2023
    Subtitle
    OWASP Top 10 Vulnerabilities
    Treehouse Jared Smith
    Jared Smith
    OWASP Top 10 Vulnerabilities
    1:17:16
    English subtitles
    04/08/2023

    Courses related to Network Security

    TrustSec
    INETrustSec
    3:14:45
    08/08/2023
    Subtitle
    Introduction to AWS Security
    Udemy Cybr Training
    Cybr Training
    Introduction to AWS Security
    3:36:48
    English subtitles
    08/08/2023

    Courses related to Information Security

    Courses related to Cyber Security Awareness