There are currently no items in your shopping cart.

User Panel

Forgot your password?.

lynda CompTIA Security+ (SY0-601) Cert Prep: 1 Threats, Attacks, and Vulnerabilities

Video Introducing this tutorial

Threats, attacks, and vulnerabilities
What you need to know
Study resources

1. Malware:
Comparing viruses, worms, and Trojans
Malware payloads
Understanding backdoors and logic bombs
Looking at advanced malware
Understanding botnets
Malicious script execution

2. Understanding Attackers:
Cybersecurity adversaries
Preventing insider threats
Attack vectors
Zero days and the advanced persistent threat

3. Threat Intelligence:
Threat intelligence
Managing threat indicators
Intelligence sharing
Threat research
Identifying threats
Automating threat intelligence
Threat hunting

4. Social Engineering Attacks:
Social engineering
Impersonation attacks
Identity fraud and pretexting
Watering hole attacks
Physical social engineering

5. Common Attacks:
Password attacks
Password spraying and credential stuffing
Adversarial artificial intelligence

6. Understanding Vulnerability Types:
Vulnerability impact
Supply chain vulnerabilities
Configuration vulnerabilities
Architectural vulnerabilities

7. Vulnerability Scanning:
What is vulnerability management?
Identify scan targets
Scan configuration
Scan perspective
SCAP (Security Content Automation Protocol)
CVSS (Common Vulnerability Scoring System)
Analyzing scan reports
Correlating scan results

8. Penetration Testing and Exercises:
Penetration testing
Bug bounty
Cybersecurity exercises

Continuing your studies