CompTIA A+ Core 2: Social Engineering Attacks

CompTIA    |    Beginner
  • 18 videos | 1h 57m 19s
  • Includes Assessment
  • Earns a Badge
Rating 4.2 of 107 users Rating 4.2 of 107 users (107)
Among the newer forms of security for most workers in the 21st century involves social engineering -protecting workers and work against subtle but dangerous attacks by con men and scammers. Take a deep dive into security fundamentals and the many ways in which devious people steal information. This can include masquerading as delivery men, entering unauthorized areas without badges, shoulder surfing at airports or coffee shops, spoofing, dumpster-diving, and insidiously clever spear phishing attacks. Explore how legitimate-looking e-mails can lure workers to malicious websites, or worse, into opening encrypted attachments with company credentials or passwords. Lastly, discover common security vulnerabilities including non-compliant, unpatched, and unprotected systems, end of life (EOL) operating systems, and bring your own devices (BYOD). This course will prepare you for the CompTIA A+ Core 2 (220-1102) certification exam.

WHAT YOU WILL LEARN

  • Discover the key concepts covered in this course
    Differentiate between phishing and vishing social engineering attacks
    Outline the risks associated with shoulder surfing
    Provide an overview of whaling phishing attacks
    Recognize the signs of a tailgating attack
    Describe how an impersonating attack is carried out
    Illustrate how items that have been disposed of can be used to retrieve information to gain access to a computer
    Recognize evil twin attacks and how to prevent them
    Recognize the signs of denial of service (dos) and ddos attacks
  • Provide an overview of zero-day attacks
    Recognize the signs of a spoofing (masquerading) threat
    Provide an overview of on-path attacks
    Describe how brute force and dictionary attacks can be used to gain access to a system
    Identify the risks associated with insider threats
    Describe sql injection attacks
    Recognize the signs of an xss attack
    List common security vulnerabilities
    Summarize the key concepts covered in this course

IN THIS COURSE

  • 1m 54s
  • 7m 4s
    In this video, you will learn how to differentiate between phishing and vishing social engineering attacks. FREE ACCESS
  • Locked
    3.  Shoulder Surfing
    6m 46s
    In this video, learn how to outline the risks associated with shoulder surfing. FREE ACCESS
  • Locked
    4.  Whaling Attacks
    7m 27s
    After completing this video, you will be able to provide an overview of whaling phishing attacks. FREE ACCESS
  • Locked
    5.  Tailgating Attacks
    5m 8s
    Upon completion of this video, you will be able to recognize the signs of a tailgating attack. FREE ACCESS
  • Locked
    6.  Impersonating Techniques
    6m 12s
    Upon completion of this video, you will be able to describe how an impersonation attack is carried out. FREE ACCESS
  • Locked
    7.  Dumpster Diving
    6m 10s
    After completing this video, you will be able to illustrate how items that have been disposed of can be used to retrieve information to gain access to a computer. FREE ACCESS
  • Locked
    8.  Evil Twin Attacks
    6m 33s
    Upon completion of this video, you will be able to recognize evil twin attacks and how to prevent them. FREE ACCESS
  • Locked
    9.  Distributed Denial of Service (DDoS)
    10m 38s
    After completing this video, you will be able to recognize the signs of denial of service (DoS) and DDoS attacks. FREE ACCESS
  • Locked
    10.  Zero-day Attacks
    8m 3s
    After completing this video, you will be able to provide an overview of zero-day attacks. FREE ACCESS
  • Locked
    11.  Spoofing Threats
    8m 7s
    Upon completion of this video, you will be able to recognize the signs of a spoofing threat. FREE ACCESS
  • Locked
    12.  On-path Attack
    6m 25s
    After completing this video, you will be able to provide an overview of on-path attacks. FREE ACCESS
  • Locked
    13.  Brute Force and Dictionary Attacks
    9m 17s
    Upon completion of this video, you will be able to describe how brute force and dictionary attacks can be used to gain access to a system. FREE ACCESS
  • Locked
    14.  Insider Threats
    7m 35s
    In this video, find out how to identify risks associated with insider threats. FREE ACCESS
  • Locked
    15.  Structured Query Language (SQL) Injection Attacks
    7m 9s
    After completing this video, you will be able to describe SQL injection attacks. FREE ACCESS
  • Locked
    16.  Cross-site Scripting (XSS) Threats
    4m 57s
    Upon completion of this video, you will be able to recognize the signs of a cross-site scripting attack. FREE ACCESS
  • Locked
    17.  Security Vulnerabilities
    6m 55s
    After completing this video, you will be able to list common security vulnerabilities. FREE ACCESS
  • Locked
    18.  Course Summary
    57s
    25548bb6-6c9c-4c5f-9d29-00b707ca03a3 FREE ACCESS

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE

Rating 4.5 of 441 users Rating 4.5 of 441 users (441)
Rating 4.6 of 5 users Rating 4.6 of 5 users (5)
Rating 4.5 of 48 users Rating 4.5 of 48 users (48)

PEOPLE WHO VIEWED THIS ALSO VIEWED THESE

Rating 4.5 of 1341 users Rating 4.5 of 1341 users (1341)
Rating 4.4 of 167 users Rating 4.4 of 167 users (167)
Rating 4.3 of 58 users Rating 4.3 of 58 users (58)