Threats, Attacks, and Vulnerabilities for CompTIA Security+
Focused View
Christopher Rees
3:17:45
75 View
00.Module-Intro.mp4
02:56
01.Indicators-of-Compromise-IOC.mp4
02:14
02.Viruses.mp4
02:56
03.Cryptomalware-and-Ransomware.mp4
03:08
04.Trojans.mp4
03:50
05.Rootkits.mp4
01:22
06.Keyloggers.mp4
01:01
07.Adware.mp4
03:04
08.Spyware.mp4
01:43
09.Botnets.mp4
02:36
10.Logic-Bomb.mp4
01:15
11.Backdoors.mp4
01:30
12.Module-Review.mp4
00:56
00.Module-Intro.mp4
00:58
01.Social-Engineering.mp4
01:48
02.Vishing.mp4
01:10
03.Tailgaiting.mp4
01:56
04.Impersonation.mp4
01:00
05.Dumpster-Diving.mp4
01:13
06.Shoulder-Surfing.mp4
02:39
07.Hoaxes.mp4
02:24
08.Watering-Hole-Attack.mp4
01:48
09.Authority-and-Intimidation.mp4
01:53
10.Consensus-and-Social-Proof.mp4
00:52
11.Familiarity-and-Liking.mp4
00:49
12.Trust.mp4
00:46
13.Scarcity-and-Urgency.mp4
00:34
14.DDoS.mp4
02:24
15.Replay-Attacks.mp4
01:06
16.Man-in-the-Middle-Attack.mp4
00:59
17.Buffer-Overflow-Attack.mp4
01:07
18.SQL-Injection-Attack.mp4
01:18
19.LDAP-Injection-Attack.mp4
00:45
20.XML-Injection-Attack.mp4
01:13
21.Cross-Site-Scription-XSS-and-Cross-Site-Request-Forgery-XSRF.mp4
05:29
22.Privilege-Escalation.mp4
02:21
23.ARP-Poisoning.mp4
01:26
24.Smurf-Attack-Amplification.mp4
03:02
25.DNS-Poisoning.mp4
01:05
26.Zero-Day.mp4
01:44
27.Pass-the-Hash.mp4
01:59
28.Clickjacking.mp4
02:28
29.Session-Hijacking.mp4
00:34
30.Typo-Squatting-and-URL-Hijacking.mp4
02:21
31.Shimming.mp4
01:08
32.Refactoring.mp4
01:02
33.IPMAC-Spoofing.mp4
00:54
34.Replay-Attacks-Wireless.mp4
01:51
35.IV-Attack.mp4
03:05
36.Rogue-Access-Points.mp4
03:24
37.WPS-Attacks.mp4
02:41
38.Bluejacking-and-Bluesnarfing.mp4
03:19
39.NFC-Attacks.mp4
01:30
40.Dissociation.mp4
01:26
41.Password-Brute-Force-and-Dictionary-Attacks.mp4
02:59
42.Birthday-Attack.mp4
02:31
43.Rainbow-Tables.mp4
02:00
44.Collision-Attack.mp4
01:28
45.Downgrade-Attack.mp4
01:00
46.Weak-Implementations-and-Module-Review.mp4
02:04
00.Module-Review-and-Threat-Actor-Types.mp4
01:45
01.Script-Kiddies.mp4
01:01
02.Hacktivists.mp4
01:01
03.Organized-Crime.mp4
01:15
04.Nation-StatesAPT.mp4
01:21
05.Insiders.mp4
01:26
06.Competitors.mp4
01:27
07.Threat-Actor-Attributes.mp4
00:40
08.Use-of-Open-Source-Intelligence-OSINT.mp4
02:35
09.Module-Review.mp4
00:51
00.Module-Overview.mp4
00:48
01.Penetration-Testing.mp4
01:12
02.Steps-of-a-Penetration-Test.mp4
02:29
03.Types-of-Reconnaissance-Including-Active-and-Passive.mp4
02:35
04.Pivoting.mp4
02:08
05.Initial-Exploitation.mp4
02:19
06.Persistence.mp4
00:38
07.Escalation-of-Privilege.mp4
00:41
08.Methods-of-Privilege-Escalation.mp4
01:34
09.Black-Box-White-Box-and-Grey-Box-Testing.mp4
01:12
10.Pen-Testing-vs-Vulnerability-Scanning.mp4
01:56
11.Red-vs-Blue-Teams.mp4
01:39
12.Module-Review.mp4
00:42
00.Module-Overview.mp4
00:48
01.Vulnerability-Scanning.mp4
00:49
02.Passively-Test-Security-Controls.mp4
00:42
03.Identify-Vulnerability-and-Lack-of-Security-Controls.mp4
01:42
04.Identify-Common-Misconfigurations.mp4
01:48
05.Intrusive-vs-Non-intrusive.mp4
00:34
06.Credentialed-vs-Non-credentialed.mp4
02:23
07.False-Positive.mp4
00:53
08.Things-to-Remember.mp4
02:29
09.Module-Review.mp4
00:44
00.Module-Overview.mp4
00:39
01.Impact-Assessment.mp4
00:33
02.Race-Conditions.mp4
01:37
03.Time-of-Check-and-Time-of-Check-to-Time-of-Use-.mp4
01:17
04.SupportLifecycle-Vulnerabilities.mp4
03:40
05.Impact-of-Vulnerabilities.mp4
01:45
06.Secure-Coding-Concepts.mp4
04:28
07.MisconfigurationWeak-Configuration.mp4
01:15
08.Default-Configuration.mp4
01:21
09.Resource-Exhaustion.mp4
01:54
10.Untrained-Users.mp4
01:39
11.Shared-Accounts-Improperly-Configured.mp4
01:18
12.Vulnerable-Business-Processes.mp4
02:27
13.Weak-Cipher-Suites-and-Implementations.mp4
01:58
14.Memory-Leaks.mp4
01:43
15.Integer-Overflow.mp4
01:09
16.Pointer-Dereference.mp4
01:23
17.DLL-Injection.mp4
01:59
18.System-SprawlUndocumented-Assets.mp4
01:15
19.ArchitectureDesign-Weaknesses.mp4
01:47
20.New-ThreatsZero-Days.mp4
02:04
21.Improper-Certificate-and-Key-Management.mp4
01:25
22.Module-Review.mp4
00:58
Description
IT Security is one of the fastest growing areas in IT, and qualified, well-trained IT security and cyber-security professionals are in high-demand. This course covers domain one of the CompTIA Security+ certification exam.
What You'll Learn?
- Malware
- Ransom-ware
- Viruses
- Trojans
- Rootkits
- Social engineering attacks
- Application vulnerabilities
- DDoS attacks
This course covers domain one of the CompTIA Security+ certification exam. In this course, Threats, Attacks, and Vulnerabilities for CompTIA Security+, you'll learn about the various types of threats and attacks every company faces.
First, you'll learn the ins and outs of:
Finally, you'll learn about penetration testing and vulnerability scanning and how they're used to help tighten security and mitigate potential breaches.
By the end of this course, you'll have a solid understanding of the various threats you're likely to face and what tools are available to mitigate these threats.
More details
User Reviews
Rating
average 0
Focused display
Category
Christopher Rees
Instructor's CoursesChris is a professional information technologist, trainer, manager and lifelong learner. He is married with 3 beautiful children and interested in martial arts, working out, spending time with family and friends and being creative whenever possible. He has created a number of IT Certification training courses over the past 10 years and really enjoys helping people advance their careers through training and personal development.

Pluralsight
View courses PluralsightPluralsight, LLC is an American privately held online education company that offers a variety of video training courses for software developers, IT administrators, and creative professionals through its website. Founded in 2004 by Aaron Skonnard, Keith Brown, Fritz Onion, and Bill Williams, the company has its headquarters in Farmington, Utah. As of July 2018, it uses more than 1,400 subject-matter experts as authors, and offers more than 7,000 courses in its catalog. Since first moving its courses online in 2007, the company has expanded, developing a full enterprise platform, and adding skills assessment modules.
- language english
- Training sessions 116
- duration 3:17:45
- level preliminary
- Release Date 2023/02/26