CompTIA Network+: Security Concepts & Threats

CompTIA Network+    |    Intermediate
  • 20 Videos | 2h 14m 43s
  • Includes Assessment
  • Earns a Badge
Network security encompasses best practices and policies that are put in place to help monitor and prevent malicious attacks against both internal and external threats. In this course, you'll learn about the confidentiality, integrity, and availability triad and other common security concepts. You’ll explore well-known threats, both internal and external, as well as common vulnerabilities and newly discovered software vulnerabilities. Next, you’ll examine authentication methods and how to perform security assessments. You'll also examine common attacks, with a focus on technology-based attacks, and learn to differentiate between denial of service, distributed denial of service and Botnet/command and control attacks. You'll further explore how to prevent and remove ransomware and malware. Lastly, you'll learn about human and environmental attacks, such as social engineering, and how to differentiate between different social engineering attacks. This course is one of a collection of courses that prepares learners for the N10-008: CompTIA Network+ certification exam.


  • discover the key concepts covered in this course
    describe the confidentiality, integrity, and availability (CIA) triad and outline how it can guide policies for information security within an organization
    recognize the most common potential internal and external threats to a network
    describe common network vulnerabilities such as zero-day attacks
    outline the characteristics of common exploits, including IP spoofing and eavesdropping
    outline the principle of least privilege
    recognize when and where to use role-based access control (RBAC)
    describe the zero trust security model
    outline the purpose and features of the defense in depth cybersecurity approach and how it can encompass separation of duties, network segmentation, network access control, and honeypots
    differentiate between authentication methods including multifactor, Terminal Access Controller Access-Control System Plus (TACACS+), Single sign-on (SSO), Remote Authentication Dial-in User Service (RADIUS), LDAP, Kerberos, local authentication, 802.1X, and Extensible Authentication Protocol (EAP)
  • describe the benefits of security assessments and outline the most common assessment techniques including vulnerability assessments, penetration testing, risk assessments, and posture assessments
    outline the purpose and characteristics of the security information and event management (SIEM) software
    differentiate between common technology-based attacks including DNS poisoning, VLAN hopping, ARP spoofing, rogue DHCP, rogue access point (AP), evil twin, brute-force, dictionary, MAC spoofing, IP spoofing, and deauthentication
    describe ransomware attacks and outline how to prevent and remove them
    recognize best practices for preventing malware attacks
    outline the purpose and characteristics of an on-path attack
    describe commonly used password attack methods
    outline the purpose and characteristics of denial of service (DoS), distributed denial of service (DDoS), and Botnet or command and control attacks
    differentiate between common types of social engineering attacks including phishing, tailgating, piggybacking, and shoulder surfing
    summarize the key concepts covered in this course


  • Playable
    Course Overview
    2m 5s
  • Playable
    Confidentiality, Integrity, and Availability
    5m 32s
  • Locked
    Common Network Threats
    7m 19s
  • Locked
    Common Network Vulnerabilities
    4m 15s
  • Locked
    Network Security Exploits
    6m 47s
  • Locked
    Principle of Least Privilege
    7m 11s
  • Locked
    Role-based Access Control
    5m 59s
  • Locked
    Zero Trust Security Model
  • Locked
    Defense in Depth
    7m 19s
  • Locked
    Common Network Authentication Methods
    12m 31s
  • Locked
    Security Assessment Exercises
    4m 24s
  • Locked
    Security Information and Event Management
    6m 47s
  • Locked
    Common Technology-based Attacks
    6m 30s
  • Locked
    Ransomware Attacks
    6m 6s
  • Locked
    Common Malware Attacks
    6m 20s
  • Locked
    On-path Attacks
    5m 57s