CompTIA Network+: Security Concepts & Threats

CompTIA Network+    |    Intermediate
  • 20 Videos | 2h 5m 43s
  • Includes Assessment
  • Earns a Badge
Likes 65 Likes 65
Network security encompasses best practices and policies that are put in place to help monitor and prevent malicious attacks against both internal and external threats. In this course, you'll learn about the confidentiality, integrity, and availability triad and other common security concepts. You'll explore well-known threats, both internal and external, as well as common vulnerabilities and newly discovered software vulnerabilities. Next, you'll examine authentication methods and how to perform security assessments. You'll also examine common attacks, with a focus on technology-based attacks, and learn to differentiate between denial of service, distributed denial of service and Botnet/command and control attacks. You'll further explore how to prevent and remove ransomware and malware. Lastly, you'll learn about human and environmental attacks, such as social engineering, and how to differentiate between different social engineering attacks. This course is one of a collection of courses that prepares learners for the N10-008: CompTIA Network+ certification exam.


  • discover the key concepts covered in this course
    describe the confidentiality, integrity, and availability (CIA) triad and outline how it can guide policies for information security within an organization
    recognize the most common potential internal and external threats to a network
    describe common network vulnerabilities such as zero-day attacks
    outline the characteristics of common exploits, including IP spoofing and eavesdropping
    outline the principle of least privilege
    recognize when and where to use role-based access control (RBAC)
    describe the zero trust security model
    outline the purpose and features of the defense in depth cybersecurity approach and how it can encompass separation of duties, network segmentation, network access control, and honeypots
    differentiate between authentication methods including multifactor, Terminal Access Controller Access-Control System Plus (TACACS+), Single sign-on (SSO), Remote Authentication Dial-in User Service (RADIUS), LDAP, Kerberos, local authentication, 802.1X, and Extensible Authentication Protocol (EAP)
  • describe the benefits of security assessments and outline the most common assessment techniques including vulnerability assessments, penetration testing, risk assessments, and posture assessments
    outline the purpose and characteristics of the security information and event management (SIEM) software
    differentiate between common technology-based attacks including DNS poisoning, VLAN hopping, ARP spoofing, rogue DHCP, rogue access point (AP), evil twin, brute-force, dictionary, MAC spoofing, IP spoofing, and deauthentication
    describe ransomware attacks and outline how to prevent and remove them
    recognize best practices for preventing malware attacks
    outline the purpose and characteristics of an on-path attack
    describe commonly used password attack methods
    outline the purpose and characteristics of denial of service (DoS), distributed denial of service (DDoS), and Botnet or command and control attacks
    differentiate between common types of social engineering attacks including phishing, tailgating, piggybacking, and shoulder surfing
    summarize the key concepts covered in this course



Skillsoft is providing you the opportunity to earn a digital badge upon successful completion of this course, which can be shared on any social network or business platform

Digital badges are yours to keep, forever.