CompTIA Security Exam Prep SY0-401: Threats and Vulnerabilities is one of Lynda.com's educational videos that prepares you for answers to questions such as threats and domain vulnerabilities in the CompTIA Security exam, and your skills in assessing and / Avoid attacks on your organization.
The CompTIA Security + test is the best entry point for those who want to work for information security. In this course, by introducing malware, network and security software and social engineering techniques used by the attackers, you will be able to defend your organization against such dangers.
Mike Chapple also covers detection and mitigating processes and penetration and vulnerability testing.
CompTIA Security Exam Prep SY0-401 Threats and Vulnerabilities :
- Comparing viruses, worms, and Trojans
- Understanding backdoors and logic bombs
- Defending against denial of service and password attacks
- Preventing insider threats
- Detecting social engineering attacks
- Preventing wireless eavesdropping
- Understanding cross-site scripting
- Preventing SQL injection
- Deterring attacks
- Securing your network
- Scanning for and assessing threats
CompTIA Security Exam Prep SY0-401: Threats and Vulnerabilities
|
|
|
|
001 Welcome
|
002 Comparing viruses, worms, and Trojans
|
003 Comparing adware, spyware, and ransomware
|
004 Understanding backdoors and logic bombs
|
|
|
|
|
005 Looking at advanced malware
|
006 Understanding botnets
|
007 Denial of service attacks
|
008 Eavesdropping attacks
|
|
|
|
|
009 Network attacks
|
010 Defending against password attacks
|
011 Watering hole attacks
|
012 Preventing insider threats
|
|
|
|
|
013 Social engineering
|
014 Impersonation attacks
|
015 Physical social engineering
|
016 Wireless eavesdropping
|
|
|
|
|
017 WPA and WPS attacks
|
018 Propagation attacks
|
019 Preventing rogues and evil twins
|
020 Understanding Bluetooth and NFC attacks
|
|
|
|
|
021 Understanding cross-site scripting
|
022 Preventing SQL injection
|
023 Defending against directory traversal
|
024 Overflow attacks
|
|
|
|
|
025 Explaining cookies and attachments
|
026 Session hijacking
|
027 Malicious add-ons
|
028 Monitoring log files
|
|
|
|
|
029 Hardening your systems
|
030 Securing your network
|
031 Improving your security posture
|
032 Control categories
|
|
|
|
|
033 Security assessment tools
|
034 Scanning for vulnerabilities
|
035 Assessing threats
|
036 Threat assessment techniques
|
|
|
|
|
037 Penetration testing
|
038 Advanced vulnerability scanning
|
039 Next steps
|