Threats, Vulnerabilities, and Mitigations for CompTIA Security+
This course will teach you the essential concepts necessary to assess, articulate, and mitigate threats and vulnerabilities within your company as well and prepare you for the Security+ exam.
What you'll learn
A successful career in cyber security is built upon a strong foundation of security concepts, tools and techniques. In this course, Threats, Vulnerabilities, and Mitigations for CompTIA Security+, you will learn how to identify and assess threats within your company and strengthen their security posture. Next, you’ll learn the common threat vectors and attack surfaces, along with the various types of vulnerabilities a bad actor is likely to try and exploit. Finally, you’ll learn the methods and best practices to mitigate those threats and vulnerabilities, hardening your network's infrastructure. When you’re finished with this course, you’ll have the concepts and knowledge necessary for the Security+ exam.
Table of contents
- Mobile Traffic, Current State, and Interesting Stats 3m
- Message Based Threat Vectors 2m
- Image Based and File Based Threat Vectors 2m
- Voice Based Threat Vectors 2m
- Additional Threat Vectors 1m
- Vulnerable Software and Misconfigurations 2m
- Shared Accounts and Improperly Configured Accounts 3m
- Open Service Ports and Port Scanning Demo 3m
- Supply Chain Attacks 3m
- Social Engineering, Phishing and Vishing 4m
- Watering Hole Attack 1m
- Type Squatting/URL Hijacking 1m
- Module Intro and Memory/DLL Injection 4m
- Buffer Overflow 1m
- Race Conditions 2m
- Malicious Update and OS-based Update Vulnerabilities 2m
- Cross Site Scripting (XSS) 2m
- SQL Injection 1m
- SQL Injection Demo 4m
- Hardware Vulnerabilities (Firmware, EOL, and Legacy Equipment) 2m
- VM Escape and VM Sprawl Avoidance 4m
- Cloud Vulnerabilities 3m
- Mobile Device Vulnerabilities 3m
- New Threats / Zero Day Vulnerabilities 2m
- Indicators of Compromise and Crypto-malware 3m
- Trojans and RATs 1m
- Worms 1m
- Spyware 1m
- Bloatware 1m
- Viruses 1m
- Botnets 1m
- Keyloggers 1m
- Logic Bomb 1m
- Rootkits 5m
- Brute Force Attacks 1m
- RFID 2m
- DDoS Attacks 1m
- Amplification Attacks and DNS Poisoning 2m
- Rogue Access Points, Evil Twins and Dissociation 2m
- On-path Attack 3m
- Malicious Code Execution 1m
- Replay Attacks 1m
- Privilege Escalation 1m
- Cross-Site Request Forgery (XSRF) 2m
- Directory Traversal/Command Injection 2m
- Downgrade Attack 1m
- Collision Attack and Birthday Attack 3m
- Password Spraying and IOC Considerations 5m