Companies Home Search Profile

Threats, Attacks, and Vulnerabilities for CompTIA Security+

Focused View

Christopher Rees

3:17:45

75 View
  • 00.Module-Intro.mp4
    02:56
  • 01.Indicators-of-Compromise-IOC.mp4
    02:14
  • 02.Viruses.mp4
    02:56
  • 03.Cryptomalware-and-Ransomware.mp4
    03:08
  • 04.Trojans.mp4
    03:50
  • 05.Rootkits.mp4
    01:22
  • 06.Keyloggers.mp4
    01:01
  • 07.Adware.mp4
    03:04
  • 08.Spyware.mp4
    01:43
  • 09.Botnets.mp4
    02:36
  • 10.Logic-Bomb.mp4
    01:15
  • 11.Backdoors.mp4
    01:30
  • 12.Module-Review.mp4
    00:56
  • 00.Module-Intro.mp4
    00:58
  • 01.Social-Engineering.mp4
    01:48
  • 02.Vishing.mp4
    01:10
  • 03.Tailgaiting.mp4
    01:56
  • 04.Impersonation.mp4
    01:00
  • 05.Dumpster-Diving.mp4
    01:13
  • 06.Shoulder-Surfing.mp4
    02:39
  • 07.Hoaxes.mp4
    02:24
  • 08.Watering-Hole-Attack.mp4
    01:48
  • 09.Authority-and-Intimidation.mp4
    01:53
  • 10.Consensus-and-Social-Proof.mp4
    00:52
  • 11.Familiarity-and-Liking.mp4
    00:49
  • 12.Trust.mp4
    00:46
  • 13.Scarcity-and-Urgency.mp4
    00:34
  • 14.DDoS.mp4
    02:24
  • 15.Replay-Attacks.mp4
    01:06
  • 16.Man-in-the-Middle-Attack.mp4
    00:59
  • 17.Buffer-Overflow-Attack.mp4
    01:07
  • 18.SQL-Injection-Attack.mp4
    01:18
  • 19.LDAP-Injection-Attack.mp4
    00:45
  • 20.XML-Injection-Attack.mp4
    01:13
  • 21.Cross-Site-Scription-XSS-and-Cross-Site-Request-Forgery-XSRF.mp4
    05:29
  • 22.Privilege-Escalation.mp4
    02:21
  • 23.ARP-Poisoning.mp4
    01:26
  • 24.Smurf-Attack-Amplification.mp4
    03:02
  • 25.DNS-Poisoning.mp4
    01:05
  • 26.Zero-Day.mp4
    01:44
  • 27.Pass-the-Hash.mp4
    01:59
  • 28.Clickjacking.mp4
    02:28
  • 29.Session-Hijacking.mp4
    00:34
  • 30.Typo-Squatting-and-URL-Hijacking.mp4
    02:21
  • 31.Shimming.mp4
    01:08
  • 32.Refactoring.mp4
    01:02
  • 33.IPMAC-Spoofing.mp4
    00:54
  • 34.Replay-Attacks-Wireless.mp4
    01:51
  • 35.IV-Attack.mp4
    03:05
  • 36.Rogue-Access-Points.mp4
    03:24
  • 37.WPS-Attacks.mp4
    02:41
  • 38.Bluejacking-and-Bluesnarfing.mp4
    03:19
  • 39.NFC-Attacks.mp4
    01:30
  • 40.Dissociation.mp4
    01:26
  • 41.Password-Brute-Force-and-Dictionary-Attacks.mp4
    02:59
  • 42.Birthday-Attack.mp4
    02:31
  • 43.Rainbow-Tables.mp4
    02:00
  • 44.Collision-Attack.mp4
    01:28
  • 45.Downgrade-Attack.mp4
    01:00
  • 46.Weak-Implementations-and-Module-Review.mp4
    02:04
  • 00.Module-Review-and-Threat-Actor-Types.mp4
    01:45
  • 01.Script-Kiddies.mp4
    01:01
  • 02.Hacktivists.mp4
    01:01
  • 03.Organized-Crime.mp4
    01:15
  • 04.Nation-StatesAPT.mp4
    01:21
  • 05.Insiders.mp4
    01:26
  • 06.Competitors.mp4
    01:27
  • 07.Threat-Actor-Attributes.mp4
    00:40
  • 08.Use-of-Open-Source-Intelligence-OSINT.mp4
    02:35
  • 09.Module-Review.mp4
    00:51
  • 00.Module-Overview.mp4
    00:48
  • 01.Penetration-Testing.mp4
    01:12
  • 02.Steps-of-a-Penetration-Test.mp4
    02:29
  • 03.Types-of-Reconnaissance-Including-Active-and-Passive.mp4
    02:35
  • 04.Pivoting.mp4
    02:08
  • 05.Initial-Exploitation.mp4
    02:19
  • 06.Persistence.mp4
    00:38
  • 07.Escalation-of-Privilege.mp4
    00:41
  • 08.Methods-of-Privilege-Escalation.mp4
    01:34
  • 09.Black-Box-White-Box-and-Grey-Box-Testing.mp4
    01:12
  • 10.Pen-Testing-vs-Vulnerability-Scanning.mp4
    01:56
  • 11.Red-vs-Blue-Teams.mp4
    01:39
  • 12.Module-Review.mp4
    00:42
  • 00.Module-Overview.mp4
    00:48
  • 01.Vulnerability-Scanning.mp4
    00:49
  • 02.Passively-Test-Security-Controls.mp4
    00:42
  • 03.Identify-Vulnerability-and-Lack-of-Security-Controls.mp4
    01:42
  • 04.Identify-Common-Misconfigurations.mp4
    01:48
  • 05.Intrusive-vs-Non-intrusive.mp4
    00:34
  • 06.Credentialed-vs-Non-credentialed.mp4
    02:23
  • 07.False-Positive.mp4
    00:53
  • 08.Things-to-Remember.mp4
    02:29
  • 09.Module-Review.mp4
    00:44
  • 00.Module-Overview.mp4
    00:39
  • 01.Impact-Assessment.mp4
    00:33
  • 02.Race-Conditions.mp4
    01:37
  • 03.Time-of-Check-and-Time-of-Check-to-Time-of-Use-.mp4
    01:17
  • 04.SupportLifecycle-Vulnerabilities.mp4
    03:40
  • 05.Impact-of-Vulnerabilities.mp4
    01:45
  • 06.Secure-Coding-Concepts.mp4
    04:28
  • 07.MisconfigurationWeak-Configuration.mp4
    01:15
  • 08.Default-Configuration.mp4
    01:21
  • 09.Resource-Exhaustion.mp4
    01:54
  • 10.Untrained-Users.mp4
    01:39
  • 11.Shared-Accounts-Improperly-Configured.mp4
    01:18
  • 12.Vulnerable-Business-Processes.mp4
    02:27
  • 13.Weak-Cipher-Suites-and-Implementations.mp4
    01:58
  • 14.Memory-Leaks.mp4
    01:43
  • 15.Integer-Overflow.mp4
    01:09
  • 16.Pointer-Dereference.mp4
    01:23
  • 17.DLL-Injection.mp4
    01:59
  • 18.System-SprawlUndocumented-Assets.mp4
    01:15
  • 19.ArchitectureDesign-Weaknesses.mp4
    01:47
  • 20.New-ThreatsZero-Days.mp4
    02:04
  • 21.Improper-Certificate-and-Key-Management.mp4
    01:25
  • 22.Module-Review.mp4
    00:58
  • Description


    IT Security is one of the fastest growing areas in IT, and qualified, well-trained IT security and cyber-security professionals are in high-demand. This course covers domain one of the CompTIA Security+ certification exam.

    What You'll Learn?


      This course covers domain one of the CompTIA Security+ certification exam. In this course, Threats, Attacks, and Vulnerabilities for CompTIA Security+, you'll learn about the various types of threats and attacks every company faces.

      First, you'll learn the ins and outs of:

      • Malware
      • Ransom-ware
      • Viruses
      • Trojans
      • Rootkits
      • Social engineering attacks
      • Application vulnerabilities
      • DDoS attacks
      Next, you'll also learn the characteristics of the various types of threat actors, the skills they have and the tools they use.

      Finally, you'll learn about penetration testing and vulnerability scanning and how they're used to help tighten security and mitigate potential breaches.

      By the end of this course, you'll have a solid understanding of the various threats you're likely to face and what tools are available to mitigate these threats.

    More details


    User Reviews
    Rating
    0
    0
    0
    0
    0
    average 0
    Total votes0
    Focused display
    Christopher Rees
    Christopher Rees
    Instructor's Courses
    Chris is a professional information technologist, trainer, manager and lifelong learner. He is married with 3 beautiful children and interested in martial arts, working out, spending time with family and friends and being creative whenever possible. He has created a number of IT Certification training courses over the past 10 years and really enjoys helping people advance their careers through training and personal development.
    Pluralsight, LLC is an American privately held online education company that offers a variety of video training courses for software developers, IT administrators, and creative professionals through its website. Founded in 2004 by Aaron Skonnard, Keith Brown, Fritz Onion, and Bill Williams, the company has its headquarters in Farmington, Utah. As of July 2018, it uses more than 1,400 subject-matter experts as authors, and offers more than 7,000 courses in its catalog. Since first moving its courses online in 2007, the company has expanded, developing a full enterprise platform, and adding skills assessment modules.
    • language english
    • Training sessions 116
    • duration 3:17:45
    • level preliminary
    • Release Date 2023/02/26