CompTIA Security+: Social Engineering Techniques & Other Attack Types

CompTIA    |    Intermediate
  • 16 videos | 1h 10m 44s
  • Includes Assessment
  • Earns a Badge
Rating 4.5 of 1341 users Rating 4.5 of 1341 users (1341)
Common attack types social engineers use target victims using a long list of examples such as phishing, smishing, vishing, pretexting, pharming, tailgaiting, and shoulder surfing. In this course, you'll learn about various social engineering techniques including types of phishing, hoaxes, and intelligence gathering. Then you'll move on to examine influence campaigns and the reasons for social engineering effectiveness. Next, you'll learn about malware attacks including password attacks, physical attacks, supply-chain, and cryptographic attacks. Finally, you'll explore adversarial AI, and cloud-based vs. on-premise attacks. This course can be used in preparation for the CompTIA Security+ SY0-601 certification exam.

WHAT YOU WILL LEARN

  • Discover the key concepts covered in this course
    Define different phishing attacks including spear phishing and whaling
    Describe spam and its variants such as spim
    Describe dumpster diving, shoulder surfing, pharming, and other exploits
    Define types of scams, fraud, and hoaxes
    Describe influence campaigns and disinformation initiatives
    Describe reasons for effectiveness such as authority, intimidation, and scarcity
    Describe various common malware attacks like viruses and worms
  • Recognize additional more complex malware attack types like fileless viruses, command and control bots, and crypto malware
    Describe password attacks such as spraying, dictionary, and brute force
    Describe physical attacks like malicious flash drives, card cloning, and skimming
    Define adversarial ai as in tainted training data for machine learning
    Describe damage done to organizations by targeting less-secure elements in the supply network
    Compare cloud-based service provider malware attacks to on-premise attacks on the data center or enterprise edge
    Describe cryptographic attacks such as birthday, collision, and downgrade
    Summarize the key concepts covered in this course

IN THIS COURSE

  • 1m 37s
  • 6m 19s
    Find out how to define different phishing attacks, including spear phishing and whaling. FREE ACCESS
  • Locked
    3.  Spam Attacks
    3m 59s
    Upon completion of this video, you will be able to describe spam and its variants, such as spim. FREE ACCESS
  • Locked
    4.  Diving, Surfing, and Pharming
    3m 28s
    Upon completion of this video, you will be able to describe dumpster diving, shoulder surfing, pharming, and other exploits. FREE ACCESS
  • Locked
    5.  Scams and Fraud
    3m 4s
    In this video, you will learn how to define types of scams, fraud, and hoaxes. FREE ACCESS
  • Locked
    6.  Influence Campaigns
    1m 44s
    Upon completion of this video, you will be able to describe influence campaigns and disinformation initiatives. FREE ACCESS
  • Locked
    7.  Principle Reasons for Effectiveness
    2m 39s
    Upon completion of this video, you will be able to describe reasons for effectiveness, such as authority, intimidation, and scarcity. FREE ACCESS
  • Locked
    8.  Common Malware Attacks
    12m 37s
    After completing this video, you will be able to describe various common malware attacks, like viruses and worms. FREE ACCESS
  • Locked
    9.  Complex Malware Attacks
    12m 51s
    After completing this video, you will be able to recognize additional, more complex malware attack types like fileless viruses, command and control bots, and crypto malware. FREE ACCESS
  • Locked
    10.  Password Attacks
    5m 46s
    After completing this video, you will be able to describe password attacks such as spraying, dictionary, and brute force attacks. FREE ACCESS
  • Locked
    11.  Physical Attacks
    2m 39s
    After completing this video, you will be able to describe physical attacks such as malicious flash drives, card cloning, and skimming. FREE ACCESS
  • Locked
    12.  Adversarial Artificial Intelligence
    2m 1s
    In this video, learn how to define adversarial AI as well as tainted training data for machine learning. FREE ACCESS
  • Locked
    13.  Supply-chain Attacks
    2m 9s
    Upon completion of this video, you will be able to describe damage done to organizations by targeting less secure elements in the supply network. FREE ACCESS
  • Locked
    14.  Cloud-based vs. On-premise Attacks
    6m
    In this video, you will compare cloud-based service provider malware attacks to on-premise attacks on the data center or enterprise edge. FREE ACCESS
  • Locked
    15.  Cryptographic Attacks
    3m 14s
    Upon completion of this video, you will be able to describe cryptographic attacks such as birthday, collision, and downgrade attacks. FREE ACCESS
  • Locked
    16.  Course Summary
    39s

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE

Rating 5.0 of 1 users Rating 5.0 of 1 users (1)
Rating 4.6 of 51 users Rating 4.6 of 51 users (51)

PEOPLE WHO VIEWED THIS ALSO VIEWED THESE