CompTIA A+ Core 2: Social Engineering Attacks
CompTIA
| Beginner
- 18 videos | 1h 57m 19s
- Includes Assessment
- Earns a Badge
Among the newer forms of security for most workers in the 21st century involves social engineering -protecting workers and work against subtle but dangerous attacks by con men and scammers. Take a deep dive into security fundamentals and the many ways in which devious people steal information. This can include masquerading as delivery men, entering unauthorized areas without badges, shoulder surfing at airports or coffee shops, spoofing, dumpster-diving, and insidiously clever spear phishing attacks. Explore how legitimate-looking e-mails can lure workers to malicious websites, or worse, into opening encrypted attachments with company credentials or passwords. Lastly, discover common security vulnerabilities including non-compliant, unpatched, and unprotected systems, end of life (EOL) operating systems, and bring your own devices (BYOD). This course will prepare you for the CompTIA A+ Core 2 (220-1102) certification exam.
WHAT YOU WILL LEARN
-
Discover the key concepts covered in this courseDifferentiate between phishing and vishing social engineering attacksOutline the risks associated with shoulder surfingProvide an overview of whaling phishing attacksRecognize the signs of a tailgating attackDescribe how an impersonating attack is carried outIllustrate how items that have been disposed of can be used to retrieve information to gain access to a computerRecognize evil twin attacks and how to prevent themRecognize the signs of denial of service (dos) and ddos attacks
-
Provide an overview of zero-day attacksRecognize the signs of a spoofing (masquerading) threatProvide an overview of on-path attacksDescribe how brute force and dictionary attacks can be used to gain access to a systemIdentify the risks associated with insider threatsDescribe sql injection attacksRecognize the signs of an xss attackList common security vulnerabilitiesSummarize the key concepts covered in this course
IN THIS COURSE
-
1m 54s
-
7m 4sIn this video, you will learn how to differentiate between phishing and vishing social engineering attacks. FREE ACCESS
-
6m 46sIn this video, learn how to outline the risks associated with shoulder surfing. FREE ACCESS
-
7m 27sAfter completing this video, you will be able to provide an overview of whaling phishing attacks. FREE ACCESS
-
5m 8sUpon completion of this video, you will be able to recognize the signs of a tailgating attack. FREE ACCESS
-
6m 12sUpon completion of this video, you will be able to describe how an impersonation attack is carried out. FREE ACCESS
-
6m 10sAfter completing this video, you will be able to illustrate how items that have been disposed of can be used to retrieve information to gain access to a computer. FREE ACCESS
-
6m 33sUpon completion of this video, you will be able to recognize evil twin attacks and how to prevent them. FREE ACCESS
-
10m 38sAfter completing this video, you will be able to recognize the signs of denial of service (DoS) and DDoS attacks. FREE ACCESS
-
8m 3sAfter completing this video, you will be able to provide an overview of zero-day attacks. FREE ACCESS
-
8m 7sUpon completion of this video, you will be able to recognize the signs of a spoofing threat. FREE ACCESS
-
6m 25sAfter completing this video, you will be able to provide an overview of on-path attacks. FREE ACCESS
-
9m 17sUpon completion of this video, you will be able to describe how brute force and dictionary attacks can be used to gain access to a system. FREE ACCESS
-
7m 35sIn this video, find out how to identify risks associated with insider threats. FREE ACCESS
-
7m 9sAfter completing this video, you will be able to describe SQL injection attacks. FREE ACCESS
-
4m 57sUpon completion of this video, you will be able to recognize the signs of a cross-site scripting attack. FREE ACCESS
-
6m 55sAfter completing this video, you will be able to list common security vulnerabilities. FREE ACCESS
-
57s25548bb6-6c9c-4c5f-9d29-00b707ca03a3 FREE ACCESS
EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE
Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.
Digital badges are yours to keep, forever.