CompTIA Network+: Security Concepts & Threats

CompTIA    |    Intermediate
  • 20 videos | 2h 5m 43s
  • Includes Assessment
  • Earns a Badge
Rating 4.5 of 129 users Rating 4.5 of 129 users (129)
Network security encompasses best practices and policies that are put in place to help monitor and prevent malicious attacks against both internal and external threats. In this course, you'll learn about the confidentiality, integrity, and availability triad and other common security concepts. You'll explore well-known threats, both internal and external, as well as common vulnerabilities and newly discovered software vulnerabilities. Next, you'll examine authentication methods and how to perform security assessments. You'll also examine common attacks, with a focus on technology-based attacks, and learn to differentiate between denial of service, distributed denial of service and Botnet/command and control attacks. You'll further explore how to prevent and remove ransomware and malware. Lastly, you'll learn about human and environmental attacks, such as social engineering, and how to differentiate between different social engineering attacks. This course is one of a collection of courses that prepares learners for the N10-008: CompTIA Network+ certification exam.

WHAT YOU WILL LEARN

  • Discover the key concepts covered in this course
    Describe the confidentiality, integrity, and availability (cia) triad and outline how it can guide policies for information security within an organization
    Recognize the most common potential internal and external threats to a network
    Describe common network vulnerabilities such as zero-day attacks
    Outline the characteristics of common exploits, including ip spoofing and eavesdropping
    Outline the principle of least privilege
    Recognize when and where to use role-based access control (rbac)
    Describe the zero trust security model
    Outline the purpose and features of the defense in depth cybersecurity approach and how it can encompass separation of duties, network segmentation, network access control, and honeypots
    Differentiate between authentication methods including multifactor, terminal access controller access-control system plus (tacacs+), single sign-on (sso), remote authentication dial-in user service (radius), ldap, kerberos, local authentication, 802.1x, and extensible authentication protocol (eap)
  • Describe the benefits of security assessments and outline the most common assessment techniques including vulnerability assessments, penetration testing, risk assessments, and posture assessments
    Outline the purpose and characteristics of the security information and event management (siem) software
    Differentiate between common technology-based attacks including dns poisoning, vlan hopping, arp spoofing, rogue dhcp, rogue access point (ap), evil twin, brute-force, dictionary, mac spoofing, ip spoofing, and deauthentication
    Describe ransomware attacks and outline how to prevent and remove them
    Recognize best practices for preventing malware attacks
    Outline the purpose and characteristics of an on-path attack
    Describe commonly used password attack methods
    Outline the purpose and characteristics of denial of service (dos), distributed denial of service (ddos), and botnet or command and control attacks
    Differentiate between common types of social engineering attacks including phishing, tailgating, piggybacking, and shoulder surfing
    Summarize the key concepts covered in this course

IN THIS COURSE

  • 2m 5s
    Discover the learning objectives and the key concepts discussed throughout this course. Briefly explore common security concepts, various well known threats, different authentication methods, and more. FREE ACCESS
  • 5m 32s
    Break down and explore the 3 parts of the confidentiality, integrity, and availability (CIA) triad to extract guidance and best practices you can use to maintain security in an organization. FREE ACCESS
  • Locked
    3.  Common Network Threats
    7m 19s
    Learn which critical security threats and risks you must know when working with internal and external network environments. Explore types and details about some commonly known examples of each. FREE ACCESS
  • Locked
    4.  Common Network Vulnerabilities
    4m 15s
    Explore types of vulnerabilities to computing environments and methods used to prevent and protect against each type of attack. FREE ACCESS
  • Locked
    5.  Network Security Exploits
    6m 47s
    Learn the importance of preventing network security exploits. Explore the most common ones and how they work using examples of each. FREE ACCESS
  • Locked
    6.  Principle of Least Privilege
    7m 11s
    Outline and examine the principle of least privilege in this video. You will understand the benefits of this principle, how to and when to implement it, and how to keep your security as high as possible. FREE ACCESS
  • Locked
    7.  Role-based Access Control
    5m 59s
    Discuss role-based access control (RBAC) including its benefits and key components. Then learn when and where to use it, what steps to take, and best practices to follow along the way. FREE ACCESS
  • Locked
    8.  Zero Trust Security Model
    5m
    Learn the details of the zero trust model, why and when to implement this model, and what combination of technologies are involved. FREE ACCESS
  • Locked
    9.  Defense in Depth
    7m 19s
    Explore the Defense in Depth (DiD) cybersecurity model and how it works to provide overall security through a combination of security controls. Next learn the different control types and groups, and the function of each one. FREE ACCESS
  • Locked
    10.  Common Network Authentication Methods
    12m 31s
    Explore common authentication methods, different protocols, and how to differentiate between each. Use this knowledge to analyze and identify the best one suited for your needs. FREE ACCESS
  • Locked
    11.  Security Assessment Exercises
    4m 24s
    Understand network security assessments used to identify new and emerging threats and how to use the results to find out your security posture. Then become more familiar with security assessments by learning the benefits they provide and the most common assessment techniques. FREE ACCESS
  • Locked
    12.  Security Information and Event Management
    6m 47s
    Take a look at security information and event management (SIEM) to identify the characteristics and attributes. Understand the purpose of SIEM software and how cloud based SaaS helps this software be available to a bigger audience. FREE ACCESS
  • Locked
    13.  Common Technology-based Attacks
    6m 30s
    Take a deep look at many network attacks and technology-based attack types. You'll break down the attacks and gain insight into how they work, which will help you differentiate between them. You will also learn some of the best practices to follow in order to protect your network. FREE ACCESS
  • Locked
    14.  Ransomware Attacks
    6m 6s
    Focus on ransomware security attack. Explore how they work, typical targets, and how to remove or prevent them.  FREE ACCESS
  • Locked
    15.  Common Malware Attacks
    6m 20s
    Examine several forms of common malware attacks, what defines and characterizes a malware attack, and what the objective is of one of these attacks. Recognize helpful ways and best practices to prevent malware as well. FREE ACCESS
  • Locked
    16.  On-path Attacks
    5m 57s
    Understand more about what is an on-path attack or attacker and outline their purpose and characteristics. Learn the risks that come with public Wi-Fi and best ways to deter these attacks. FREE ACCESS
  • Locked
    17.  Common Password Security Attacks
    11m 30s
    Explore types of password security attacks and learn specifics through exploration of examples for each type. FREE ACCESS
  • Locked
    18.  Denial of Service Attacks
    7m 27s
    Focus on the purpose and characteristics of a denial of service (DOS) attack ant the next level up from DOS, distributed denial of service attacks (DDOS). You will get a closer look at different categories of these attacks, common attack forms, and reasons for this type of attack. FREE ACCESS
  • Locked
    19.  Social Engineering Attacks
    5m 33s
    Learn about social engineering attacks and be able to differentiate between the common attack types within this category. Explore the techniques involved with social engineering attacks and how to prevent them in the first place. FREE ACCESS
  • Locked
    20.  Course Summary
    1m 12s
    Review how network security encompasses best practices and policies you put in place to help monitor and prevent malicious attacks against internal and external threats and how the confidentiality, integrity, and availability triad can help. Explore well-known threats, as well as common vulnerabilities and newly discovered software vulnerabilities. Examine authentication methods and how to perform security assessments. Look into preventing and removing ransom ware, malware and social engineering attacks and how to differentiate between them. FREE ACCESS

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE

Rating 4.5 of 12 users Rating 4.5 of 12 users (12)
Rating 4.7 of 3 users Rating 4.7 of 3 users (3)
Rating 4.4 of 58 users Rating 4.4 of 58 users (58)

PEOPLE WHO VIEWED THIS ALSO VIEWED THESE

Rating 4.6 of 18 users Rating 4.6 of 18 users (18)
Rating 4.5 of 85 users Rating 4.5 of 85 users (85)
Rating 4.5 of 64 users Rating 4.5 of 64 users (64)