CompTIA Security+: Social Engineering Techniques & Other Attack Types

CompTIA Security+    |    Intermediate
  • 16 Videos | 1h 17m 44s
  • Includes Assessment
  • Earns a Badge
Likes 444 Likes 444
Common attack types social engineers use target victims using a long list of examples such as phishing, smishing, vishing, pretexting, pharming, tailgaiting, and shoulder surfing. In this course, you'll learn about various social engineering techniques including types of phishing, hoaxes, and intelligence gathering. Then you'll move on to examine influence campaigns and the reasons for social engineering effectiveness. Next, you'll learn about malware attacks including password attacks, physical attacks, supply-chain, and cryptographic attacks. Finally, you'll explore adversarial AI, and cloud-based vs. on-premise attacks. This course can be used in preparation for the CompTIA Security+ SY0-601 certification exam.


  • discover the key concepts covered in this course
    define different phishing attacks including spear phishing and whaling
    describe spam and its variants such as spim
    describe dumpster diving, shoulder surfing, pharming, and other exploits
    define types of scams, fraud, and hoaxes
    describe influence campaigns and disinformation initiatives
    describe reasons for effectiveness such as authority, intimidation, and scarcity
    describe various common malware attacks like viruses and worms
  • recognize additional more complex malware attack types like fileless viruses, command and control bots, and crypto malware
    describe password attacks such as spraying, dictionary, and brute force
    describe physical attacks like malicious flash drives, card cloning, and skimming
    define adversarial AI as in tainted training data for machine learning
    describe damage done to organizations by targeting less-secure elements in the supply network
    compare cloud-based service provider malware attacks to on-premise attacks on the data center or enterprise edge
    describe cryptographic attacks such as birthday, collision, and downgrade
    summarize the key concepts covered in this course



Skillsoft is providing you the opportunity to earn a digital badge upon successful completion of this course, which can be shared on any social network or business platform

Digital badges are yours to keep, forever.