CompTIA A+ Core 2: Social Engineering Attacks
CompTIA A+
| Beginner
- 18 Videos | 1h 57m 19s
- Includes Assessment
- Earns a Badge
Among the newer forms of security for most workers in the 21st century involves social engineering -protecting workers and work against subtle but dangerous attacks by con men and scammers. Take a deep dive into security fundamentals and the many ways in which devious people steal information. This can include masquerading as delivery men, entering unauthorized areas without badges, shoulder surfing at airports or coffee shops, spoofing, dumpster-diving, and insidiously clever spear phishing attacks. Explore how legitimate-looking e-mails can lure workers to malicious websites, or worse, into opening encrypted attachments with company credentials or passwords. Lastly, discover common security vulnerabilities including non-compliant, unpatched, and unprotected systems, end of life (EOL) operating systems, and bring your own devices (BYOD). This course will prepare you for the CompTIA A+ Core 2 (220-1102) certification exam.
WHAT YOU WILL LEARN
-
discover the key concepts covered in this coursedifferentiate between phishing and vishing social engineering attacksoutline the risks associated with shoulder surfingprovide an overview of whaling phishing attacksrecognize the signs of a tailgating attackdescribe how an impersonating attack is carried outillustrate how items that have been disposed of can be used to retrieve information to gain access to a computerrecognize evil twin attacks and how to prevent themrecognize the signs of denial of service (DoS) and DDoS attacks
-
provide an overview of zero-day attacksrecognize the signs of a spoofing (masquerading) threatprovide an overview of on-path attacksdescribe how brute force and dictionary attacks can be used to gain access to a systemidentify the risks associated with insider threatsdescribe SQL injection attacksrecognize the signs of an XSS attacklist common security vulnerabilitiessummarize the key concepts covered in this course
IN THIS COURSE
-
1.Course Overview1m 54sUP NEXT
-
2.Phishing and Vishing Techniques7m 4s
-
3.Shoulder Surfing6m 46s
-
4.Whaling Attacks7m 27s
-
5.Tailgating Attacks5m 8s
-
6.Impersonating Techniques6m 12s
-
7.Dumpster Diving6m 10s
-
8.Evil Twin Attacks6m 33s
-
9.Distributed Denial of Service (DDoS)10m 38s
-
10.Zero-day Attacks8m 3s
-
11.Spoofing Threats8m 7s
-
12.On-path Attack6m 25s
-
13.Brute Force and Dictionary Attacks9m 17s
-
14.Insider Threats7m 35s
-
15.Structured Query Language (SQL) Injection Attacks7m 9s
-
16.Cross-site Scripting (XSS) Threats4m 57s
-
17.Security Vulnerabilities6m 55s
-
18.Course Summary57s
EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE
Skillsoft is providing you the opportunity to earn a digital badge upon successful completion of this course, which can be shared on any social network or business platform
Digital badges are yours to keep, forever.