CompTIA A+ Core 2: Social Engineering Attacks

CompTIA A+    |    Beginner
  • 18 Videos | 1h 57m 19s
  • Includes Assessment
  • Earns a Badge
Among the newer forms of security for most workers in the 21st century involves social engineering -protecting workers and work against subtle but dangerous attacks by con men and scammers. Take a deep dive into security fundamentals and the many ways in which devious people steal information. This can include masquerading as delivery men, entering unauthorized areas without badges, shoulder surfing at airports or coffee shops, spoofing, dumpster-diving, and insidiously clever spear phishing attacks. Explore how legitimate-looking e-mails can lure workers to malicious websites, or worse, into opening encrypted attachments with company credentials or passwords. Lastly, discover common security vulnerabilities including non-compliant, unpatched, and unprotected systems, end of life (EOL) operating systems, and bring your own devices (BYOD). This course will prepare you for the CompTIA A+ Core 2 (220-1102) certification exam.

WHAT YOU WILL LEARN

  • discover the key concepts covered in this course
    differentiate between phishing and vishing social engineering attacks
    outline the risks associated with shoulder surfing
    provide an overview of whaling phishing attacks
    recognize the signs of a tailgating attack
    describe how an impersonating attack is carried out
    illustrate how items that have been disposed of can be used to retrieve information to gain access to a computer
    recognize evil twin attacks and how to prevent them
    recognize the signs of denial of service (DoS) and DDoS attacks
  • provide an overview of zero-day attacks
    recognize the signs of a spoofing (masquerading) threat
    provide an overview of on-path attacks
    describe how brute force and dictionary attacks can be used to gain access to a system
    identify the risks associated with insider threats
    describe SQL injection attacks
    recognize the signs of an XSS attack
    list common security vulnerabilities
    summarize the key concepts covered in this course

IN THIS COURSE

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion of this course, which can be shared on any social network or business platform

Digital badges are yours to keep, forever.