CompTIA Security+: Social Engineering Techniques & Other Attack Types
CompTIA
| Intermediate
- 16 videos | 1h 10m 44s
- Includes Assessment
- Earns a Badge
Common attack types social engineers use target victims using a long list of examples such as phishing, smishing, vishing, pretexting, pharming, tailgaiting, and shoulder surfing. In this course, you'll learn about various social engineering techniques including types of phishing, hoaxes, and intelligence gathering. Then you'll move on to examine influence campaigns and the reasons for social engineering effectiveness. Next, you'll learn about malware attacks including password attacks, physical attacks, supply-chain, and cryptographic attacks. Finally, you'll explore adversarial AI, and cloud-based vs. on-premise attacks. This course can be used in preparation for the CompTIA Security+ SY0-601 certification exam.
WHAT YOU WILL LEARN
-
Discover the key concepts covered in this courseDefine different phishing attacks including spear phishing and whalingDescribe spam and its variants such as spimDescribe dumpster diving, shoulder surfing, pharming, and other exploitsDefine types of scams, fraud, and hoaxesDescribe influence campaigns and disinformation initiativesDescribe reasons for effectiveness such as authority, intimidation, and scarcityDescribe various common malware attacks like viruses and worms
-
Recognize additional more complex malware attack types like fileless viruses, command and control bots, and crypto malwareDescribe password attacks such as spraying, dictionary, and brute forceDescribe physical attacks like malicious flash drives, card cloning, and skimmingDefine adversarial ai as in tainted training data for machine learningDescribe damage done to organizations by targeting less-secure elements in the supply networkCompare cloud-based service provider malware attacks to on-premise attacks on the data center or enterprise edgeDescribe cryptographic attacks such as birthday, collision, and downgradeSummarize the key concepts covered in this course
IN THIS COURSE
-
1m 37s
-
6m 19sFind out how to define different phishing attacks, including spear phishing and whaling. FREE ACCESS
-
3m 59sUpon completion of this video, you will be able to describe spam and its variants, such as spim. FREE ACCESS
-
3m 28sUpon completion of this video, you will be able to describe dumpster diving, shoulder surfing, pharming, and other exploits. FREE ACCESS
-
3m 4sIn this video, you will learn how to define types of scams, fraud, and hoaxes. FREE ACCESS
-
1m 44sUpon completion of this video, you will be able to describe influence campaigns and disinformation initiatives. FREE ACCESS
-
2m 39sUpon completion of this video, you will be able to describe reasons for effectiveness, such as authority, intimidation, and scarcity. FREE ACCESS
-
12m 37sAfter completing this video, you will be able to describe various common malware attacks, like viruses and worms. FREE ACCESS
-
12m 51sAfter completing this video, you will be able to recognize additional, more complex malware attack types like fileless viruses, command and control bots, and crypto malware. FREE ACCESS
-
5m 46sAfter completing this video, you will be able to describe password attacks such as spraying, dictionary, and brute force attacks. FREE ACCESS
-
2m 39sAfter completing this video, you will be able to describe physical attacks such as malicious flash drives, card cloning, and skimming. FREE ACCESS
-
2m 1sIn this video, learn how to define adversarial AI as well as tainted training data for machine learning. FREE ACCESS
-
2m 9sUpon completion of this video, you will be able to describe damage done to organizations by targeting less secure elements in the supply network. FREE ACCESS
-
6mIn this video, you will compare cloud-based service provider malware attacks to on-premise attacks on the data center or enterprise edge. FREE ACCESS
-
3m 14sUpon completion of this video, you will be able to describe cryptographic attacks such as birthday, collision, and downgrade attacks. FREE ACCESS
-
39s
EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE
Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.
Digital badges are yours to keep, forever.