CompTIA Security+ (SY0-601) Cert Prep: 1 Threats, Attacks, and Vulnerabilities

  • 2-3 hours worth of material
  • LinkedIn Learning
  • English
CompTIA Security+ (SY0-601) Cert Prep: 1 Threats, Attacks, and Vulnerabilities

Course Overview

Prepare for the first domain of the CompTIA Security+ (SY0-601) exam, Threats, Attacks, and Vulnerabilities.

Course Circullum

Introduction
  • Threats, attacks, and vulnerabilities
  • What you need to know
  • Study resources
1. Malware
  • Comparing viruses, worms, and Trojans
  • Malware payloads
  • Understanding backdoors and logic bombs
  • Looking at advanced malware
  • Understanding botnets
  • Malicious script execution
2. Understanding Attackers
  • Cybersecurity adversaries
  • Preventing insider threats
  • Attack vectors
  • Zero days and the advanced persistent threat
3. Threat Intelligence
  • Threat intelligence
  • Managing threat indicators
  • Intelligence sharing
  • Threat research
  • Identifying threats
  • Automating threat intelligence
  • Threat hunting
4. Social Engineering Attacks
  • Social engineering
  • Impersonation attacks
  • Identity fraud and pretexting
  • Watering hole attacks
  • Physical social engineering
5. Common Attacks
  • Password attacks
  • Password spraying and credential stuffing
  • Adversarial artificial intelligence
6. Understanding Vulnerability Types
  • Vulnerability impact
  • Supply chain vulnerabilities
  • Configuration vulnerabilities
  • Architectural vulnerabilities
7. Vulnerability Scanning
  • What is vulnerability management?
  • Identify scan targets
  • Scan configuration
  • Scan perspective
  • SCAP (Security Content Automation Protocol)
  • CVSS (Common Vulnerability Scoring System)
  • Analyzing scan reports
  • Correlating scan results
8. Penetration Testing and Exercises
  • Penetration testing
  • Bug bounty
  • Cybersecurity exercises
Conclusion
  • Continuing your studies
out of 5.0
5 Star 85%
4 Star 75%
3 Star 53%
1 Star 20%

Item Reviews - 3

Submit Reviews

Free Trial Available

This Course Include:
Introduction
  • Threats, attacks, and vulnerabilities
  • What you need to know
  • Study resources
1. Malware
  • Comparing viruses, worms, and Trojans
  • Malware payloads
  • Understanding backdoors and logic bombs
  • Looking at advanced malware
  • Understanding botnets
  • Malicious script execution
2. Understanding Attackers
  • Cybersecurity adversaries
  • Preventing insider threats
  • Attack vectors
  • Zero days and the advanced persistent threat
3. Threat Intelligence
  • Threat intelligence
  • Managing threat indicators
  • Intelligence sharing
  • Threat research
  • Identifying threats
  • Automating threat intelligence
  • Threat hunting
4. Social Engineering Attacks
  • Social engineering
  • Impersonation attacks
  • Identity fraud and pretexting
  • Watering hole attacks
  • Physical social engineering
5. Common Attacks
  • Password attacks
  • Password spraying and credential stuffing
  • Adversarial artificial intelligence
6. Understanding Vulnerability Types
  • Vulnerability impact
  • Supply chain vulnerabilities
  • Configuration vulnerabilities
  • Architectural vulnerabilities
7. Vulnerability Scanning
  • What is vulnerability management?
  • Identify scan targets
  • Scan configuration
  • Scan perspective
  • SCAP (Security Content Automation Protocol)
  • CVSS (Common Vulnerability Scoring System)
  • Analyzing scan reports
  • Correlating scan results
8. Penetration Testing and Exercises
  • Penetration testing
  • Bug bounty
  • Cybersecurity exercises
Conclusion
  • Continuing your studies
  • Provider:LinkedIn Learning
  • Certificate:Certificate Available
  • Language:English
  • Duration:2-3 hours worth of material
  • Language CC:

Do You Have Questions ?

We'll help you to grow your career and growth.
Contact Us Today