Users Online

· Guests Online: 150

· Members Online: 0

· Total Members: 188
· Newest Member: meenachowdary055

Forum Threads

Newest Threads
No Threads created
Hottest Threads
No Threads created

Latest Articles

CompTIA Security Exam Prep SY0-401 Threats and Vulnerabilities :

 

 

CompTIA Security Exam Prep SY0-401: Threats and Vulnerabilities is one of Lynda.com's educational videos that prepares you for answers to questions such as threats and domain vulnerabilities  in the CompTIA Security exam, and your skills in assessing and / Avoid attacks on your organization. 
The CompTIA Security + test is the best entry point for those who want to work for information security. In this course, by introducing malware, network and security software and social engineering techniques used by the attackers, you will be able to defend your organization against such dangers. 
Mike Chapple also covers detection and mitigating processes and penetration and vulnerability testing. 

CompTIA Security Exam Prep SY0-401 Threats and Vulnerabilities :

- Comparing viruses, worms, and Trojans

 

- Understanding backdoors and logic bombs

 

- Defending against denial of service and password attacks

 

- Preventing insider threats

 

- Detecting social engineering attacks

 

- Preventing wireless eavesdropping

 

- Understanding cross-site scripting

 

- Preventing SQL injection

 

- Deterring attacks

 

- Securing your network

 

- Scanning for and assessing threats

 

 

 


------------------------------------------------------------------------------------------------------------------------------------------------------

 

 

 


CompTIA Security Exam Prep SY0-401: Threats and Vulnerabilities



001 Welcome
002 Comparing viruses, worms, and Trojans
003 Comparing adware, spyware, and ransomware
004 Understanding backdoors and logic bombs
005 Looking at advanced malware
006 Understanding botnets
007 Denial of service attacks
008 Eavesdropping attacks
009 Network attacks
010 Defending against password attacks
011 Watering hole attacks
012 Preventing insider threats
013 Social engineering
014 Impersonation attacks
015 Physical social engineering
016 Wireless eavesdropping
017 WPA and WPS attacks
018 Propagation attacks
019 Preventing rogues and evil twins
020 Understanding Bluetooth and NFC attacks
021 Understanding cross-site scripting
022 Preventing SQL injection
023 Defending against directory traversal
024 Overflow attacks
025 Explaining cookies and attachments
026 Session hijacking
027 Malicious add-ons
028 Monitoring log files
029 Hardening your systems
030 Securing your network
031 Improving your security posture
032 Control categories
033 Security assessment tools
034 Scanning for vulnerabilities
035 Assessing threats
036 Threat assessment techniques
037 Penetration testing
038 Advanced vulnerability scanning
039 Next steps



Comments

No Comments have been Posted.

Post Comment

Please Login to Post a Comment.

Ratings

Rating is available to Members only.

Please login or register to vote.

No Ratings have been Posted.
Render time: 0.90 seconds
10,811,898 unique visits