CompTIA Security+ (SY0-601) Cert Prep: 1 Threats, Attacks, and Vulnerabilities

Go to class
Write Review

Free Online Course: CompTIA Security+ (SY0-601) Cert Prep: 1 Threats, Attacks, and Vulnerabilities provided by LinkedIn Learning is a comprehensive online course, which lasts for 2-3 hours worth of material. The course is taught in English and is free of charge. Upon completion of the course, you can receive an e-certificate from LinkedIn Learning. CompTIA Security+ (SY0-601) Cert Prep: 1 Threats, Attacks, and Vulnerabilities is taught by Mike Chapple.

Overview
  • Prepare for the first domain of the CompTIA Security+ (SY0-601) exam, Threats, Attacks, and Vulnerabilities.

Syllabus
  • Introduction

    • Threats, attacks, and vulnerabilities
    • What you need to know
    • Study resources
    1. Malware
    • Comparing viruses, worms, and Trojans
    • Malware payloads
    • Understanding backdoors and logic bombs
    • Looking at advanced malware
    • Understanding botnets
    • Malicious script execution
    2. Understanding Attackers
    • Cybersecurity adversaries
    • Preventing insider threats
    • Attack vectors
    • Zero days and the advanced persistent threat
    3. Threat Intelligence
    • Threat intelligence
    • Managing threat indicators
    • Intelligence sharing
    • Threat research
    • Identifying threats
    • Automating threat intelligence
    • Threat hunting
    4. Social Engineering Attacks
    • Social engineering
    • Impersonation attacks
    • Identity fraud and pretexting
    • Watering hole attacks
    • Physical social engineering
    5. Common Attacks
    • Password attacks
    • Password spraying and credential stuffing
    • Adversarial artificial intelligence
    6. Understanding Vulnerability Types
    • Vulnerability impact
    • Supply chain vulnerabilities
    • Configuration vulnerabilities
    • Architectural vulnerabilities
    7. Vulnerability Scanning
    • What is vulnerability management?
    • Identify scan targets
    • Scan configuration
    • Scan perspective
    • SCAP (Security Content Automation Protocol)
    • CVSS (Common Vulnerability Scoring System)
    • Analyzing scan reports
    • Correlating scan results
    8. Penetration Testing and Exercises
    • Penetration testing
    • Bug bounty
    • Cybersecurity exercises
    Conclusion
    • Continuing your studies