-
Course
- Security
Threats, Vulnerabilities, and Mitigations for CompTIA Security+
This course will teach you the essential concepts necessary to assess, articulate, and mitigate threats and vulnerabilities within your company as well and prepare you for the Security+ exam.
What you'll learn
A successful career in cyber security is built upon a strong foundation of security concepts, tools and techniques. In this course, Threats, Vulnerabilities, and Mitigations for CompTIA Security+, you will learn how to identify and assess threats within your company and strengthen their security posture. Next, you’ll learn the common threat vectors and attack surfaces, along with the various types of vulnerabilities a bad actor is likely to try and exploit. Finally, you’ll learn the methods and best practices to mitigate those threats and vulnerabilities, hardening your network's infrastructure. When you’re finished with this course, you’ll have the concepts and knowledge necessary for the Security+ exam.
Table of contents
- Mobile Traffic, Current State, and Interesting Stats | 2m 40s
- Message Based Threat Vectors | 2m 27s
- Image Based and File Based Threat Vectors | 2m 17s
- Voice Based Threat Vectors | 1m 45s
- Additional Threat Vectors | 1m 17s
- Vulnerable Software and Misconfigurations | 2m 7s
- Shared Accounts and Improperly Configured Accounts | 2m 58s
- Open Service Ports and Port Scanning Demo | 3m 19s
- Supply Chain Attacks | 3m 18s
- Social Engineering, Phishing and Vishing | 3m 37s
- Watering Hole Attack | 34s
- Type Squatting/URL Hijacking | 1m 12s
- Module Intro and Memory/DLL Injection | 3m 49s
- Buffer Overflow | 36s
- Race Conditions | 2m 29s
- Malicious Update and OS-based Update Vulnerabilities | 1m 33s
- Cross Site Scripting (XSS) | 1m 55s
- SQL Injection | 45s
- SQL Injection Demo | 4m 14s
- Hardware Vulnerabilities (Firmware, EOL, and Legacy Equipment) | 1m 58s
- VM Escape and VM Sprawl Avoidance | 3m 56s
- Cloud Vulnerabilities | 3m 14s
- Mobile Device Vulnerabilities | 3m 4s
- New Threats / Zero Day Vulnerabilities | 1m 35s
- Indicators of Compromise and Crypto-malware | 3m 22s
- Trojans and RATs | 46s
- Worms | 30s
- Spyware | 1m 8s
- Bloatware | 59s
- Viruses | 57s
- Botnets | 1m 7s
- Keyloggers | 47s
- Logic Bomb | 44s
- Rootkits | 4m 46s
- Brute Force Attacks | 1m 19s
- RFID | 1m 52s
- DDoS Attacks | 1m 2s
- Amplification Attacks and DNS Poisoning | 1m 55s
- Rogue Access Points, Evil Twins and Dissociation | 2m
- On-path Attack | 2m 35s
- Malicious Code Execution | 1m 17s
- Replay Attacks | 1m 20s
- Privilege Escalation | 48s
- Cross-Site Request Forgery (XSRF) | 2m 10s
- Directory Traversal/Command Injection | 1m 35s
- Downgrade Attack | 1m 5s
- Collision Attack and Birthday Attack | 2m 37s
- Password Spraying and IOC Considerations | 5m 17s
- Segmentation, Physical, and Logical | 3m 40s
- Virtualization | 1m 9s
- Air Gaps | 51s
- Access Control Lists (ACLs) and Least Privilege | 3m 31s
- Patch Management | 1m 50s
- Encryption | 1m 30s
- Configuration Enforcement | 2m 16s
- SOAR | 2m 44s
- Endpoint Detection and Response (EDR) | 44s
- Host-based Firewall | 48s
- HIDS/HIPS | 2m 30s
About the author
Chris is a lifelong learner and professional information technologist, trainer and IT Manager. Married with 3 children, Chris is interested in martial arts, working out, spending time with family and friends and being creative whenever possible.
More Courses by Christopher