MyPage is a personalized page based on your interests.The page is customized to help you to find content that matters you the most.


I'm not curious

CompTIA Security+ (SY0-401) Threats and Vulnerabilities

Course Summary

CompTIA Security+ (2014 Objectives): Domain 3 - Threats and Vulnerabilities


  • +

    Course Syllabus

    Types of Malware
    - 26m 45s

    —Course Overview and Adware 5m 56s
    —Virus 3m 41s
    —Spyware 1m 15s
    —Trojans and Remote Access Tools (RAT) 4m 25s
    —Rootkits 1m 15s
    —Backdoors 1m 22s
    —Logic Bombs 1m 56s
    —Botnets and Ransomware 4m 50s
    —Polymorphic Malware and Armored Virus 2m 0s
    Types of Attacks
    - 41m 17s

    —Overview 1m 54s
    —Man-in-the-Middle 2m 52s
    —DDoS 5m 18s
    —Spoofing 0m 54s
    —Spam 1m 13s
    —Phishing 1m 52s
    —Spim 0m 50s
    —Vishing 1m 45s
    —Spear Phishing 0m 57s
    —Xmas Attack 3m 0s
    —Pharming 3m 18s
    —Privilege Escalation 2m 21s
    —Malicious Insider Threat 0m 50s
    —Transitive Access 1m 16s
    —Client-Side Attacks 2m 5s
    —Password Attacks 7m 6s
    —Typo Squatting/URL Hijacking 1m 8s
    —Watering Hole Attack 1m 50s
    —Module Review 0m 39s
    Effectiveness of Social Engineering Attacks
    - 24m 45s
    Wireless Attacks
    - 23m 3s
    Application Attacks
    - 31m 10s
    Mitigation and Deterrent Techniques
    - 29m 14s
    Discovering Security Threats and Vulnerabilities
    - 26m 50s
    Penetration Testing vs. Vulnerability Scanning
    - 21m 5s


Course Fee:
USD 29

Course Type:

Self-Study

Course Status:

Active

Workload:

1 - 4 hours / week

Attended this course?

Back to Top

 
Awards & Accolades for MyTechLogy
Winner of
REDHERRING
Top 100 Asia
Finalist at SiTF Awards 2014 under the category Best Social & Community Product
Finalist at HR Vendor of the Year 2015 Awards under the category Best Learning Management System
Finalist at HR Vendor of the Year 2015 Awards under the category Best Talent Management Software
Hidden Image Url

Back to Top