CompTIA Security+: Survey of Malicious Activities

CompTIA Security+    |    Beginner
  • 9 videos | 35m 49s
  • Includes Assessment
  • Earns a Badge
Rating 5.0 of 3 users Rating 5.0 of 3 users (3)
Malicious software, also known as malware, comes in a variety of attack vectors and characteristics. The ability to stay current with the different malware and variants is one of the biggest challenges for modern security professionals. Begin this course by exploring malware attacks like ransomware, trojan horses, and logic bombs. Then you will investigate physical and network attacks including brute force, denial-of-service, and credential replay attacks. Next, you will focus on application and cryptographic attacks, such as buffer overflow, privilege escalation, collision, and birthday attacks. Finally, you will take a look at password attacks and discover indicators of compromise, like concurrent session usage, blocked content, and impossible travel. This course is part of a series that prepares you for the CompTIA Security+ (SY0-701) exam.

WHAT YOU WILL LEARN

  • Discover the key concepts covered in this course
    Compare malware attacks, including ransomware, trojan horses, remote access trojans (rats), worms, viruses, spyware and bloatware, keyloggers, logic bombs, and rootkits
    Define physical attacks, such as brute force, radio-frequency identification (rfid) cloning, and environmental
    Describe network attacks, including denial-of-service (dos)/distributed denial-of-service (ddos), domain name system (dns) attacks, wireless, on-path, credential replay, and malicious code
    Provide an overview of different application attacks, such as injection, buffer overflow, replay, privilege escalation, forgery, and directory traversal
  • Compare cryptographic attacks like downgrade, collision, birthday, brute force, and side-channel
    Define password attacks, including spraying, brute force, and wordlists
    Describe various indicators of compromise like account lockout, concurrent session usage, blocked content, impossible travel, resource consumption, out-of-cycle logging, and missing logs
    Summarize the key concepts covered in this course

IN THIS COURSE

  • 28s
    In this video, we will discover the key concepts covered in this course. FREE ACCESS
  • 9m 7s
    After completing this video, you will be able to compare malware attacks, including ransomware, trojan horses, remote access trojans (RATs), worms, viruses, spyware and bloatware, keyloggers, logic bombs, and rootkits. FREE ACCESS
  • Locked
    3.  Physical Attacks
    2m 48s
    Upon completion of this video, you will be able to define physical attacks, such as brute force, radio-frequency identification (RFID) cloning, and environmental. FREE ACCESS
  • Locked
    4.  Network Attacks
    7m 44s
    After completing this video, you will be able to describe network attacks, including denial-of-service (DoS)/distributed denial-of-service (DDoS), domain name system (DNS) attacks, wireless, on-path, credential replay, and malicious code. FREE ACCESS
  • Locked
    5.  Application Attacks
    5m 15s
    Upon completion of this video, you will be able to provide an overview of different application attacks, such as injection, buffer overflow, replay, privilege escalation, forgery, and directory traversal. FREE ACCESS
  • Locked
    6.  Cryptographic Attacks
    2m 48s
    After completing this video, you will be able to compare cryptographic attacks like downgrade, collision, birthday, brute force, and side-channel. FREE ACCESS
  • Locked
    7.  Exploring Password Attacks
    4m 43s
    In this video, we will define password attacks, including spraying, brute force, and wordlists. FREE ACCESS
  • Locked
    8.  Indicators of Compromise
    2m 26s
    Upon completion of this video, you will be able to describe various indicators of compromise like account lockout, concurrent session usage, blocked content, impossible travel, resource consumption, out-of-cycle logging, and missing logs. FREE ACCESS
  • Locked
    9.  Course Summary
    30s
    In this video, we will summarize the key concepts covered in this course. FREE ACCESS

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE

Rating 4.6 of 30 users Rating 4.6 of 30 users (30)
Rating 5.0 of 1 users Rating 5.0 of 1 users (1)
Rating 5.0 of 4 users Rating 5.0 of 4 users (4)