CompTIA Security+: Survey of Malicious Activities
CompTIA Security+
| Beginner
- 9 videos | 35m 49s
- Includes Assessment
- Earns a Badge
Malicious software, also known as malware, comes in a variety of attack vectors and characteristics. The ability to stay current with the different malware and variants is one of the biggest challenges for modern security professionals. Begin this course by exploring malware attacks like ransomware, trojan horses, and logic bombs. Then you will investigate physical and network attacks including brute force, denial-of-service, and credential replay attacks. Next, you will focus on application and cryptographic attacks, such as buffer overflow, privilege escalation, collision, and birthday attacks. Finally, you will take a look at password attacks and discover indicators of compromise, like concurrent session usage, blocked content, and impossible travel. This course is part of a series that prepares you for the CompTIA Security+ (SY0-701) exam.
WHAT YOU WILL LEARN
-
Discover the key concepts covered in this courseCompare malware attacks, including ransomware, trojan horses, remote access trojans (rats), worms, viruses, spyware and bloatware, keyloggers, logic bombs, and rootkitsDefine physical attacks, such as brute force, radio-frequency identification (rfid) cloning, and environmentalDescribe network attacks, including denial-of-service (dos)/distributed denial-of-service (ddos), domain name system (dns) attacks, wireless, on-path, credential replay, and malicious codeProvide an overview of different application attacks, such as injection, buffer overflow, replay, privilege escalation, forgery, and directory traversal
-
Compare cryptographic attacks like downgrade, collision, birthday, brute force, and side-channelDefine password attacks, including spraying, brute force, and wordlistsDescribe various indicators of compromise like account lockout, concurrent session usage, blocked content, impossible travel, resource consumption, out-of-cycle logging, and missing logsSummarize the key concepts covered in this course
IN THIS COURSE
-
28sIn this video, we will discover the key concepts covered in this course. FREE ACCESS
-
9m 7sAfter completing this video, you will be able to compare malware attacks, including ransomware, trojan horses, remote access trojans (RATs), worms, viruses, spyware and bloatware, keyloggers, logic bombs, and rootkits. FREE ACCESS
-
2m 48sUpon completion of this video, you will be able to define physical attacks, such as brute force, radio-frequency identification (RFID) cloning, and environmental. FREE ACCESS
-
7m 44sAfter completing this video, you will be able to describe network attacks, including denial-of-service (DoS)/distributed denial-of-service (DDoS), domain name system (DNS) attacks, wireless, on-path, credential replay, and malicious code. FREE ACCESS
-
5m 15sUpon completion of this video, you will be able to provide an overview of different application attacks, such as injection, buffer overflow, replay, privilege escalation, forgery, and directory traversal. FREE ACCESS
-
2m 48sAfter completing this video, you will be able to compare cryptographic attacks like downgrade, collision, birthday, brute force, and side-channel. FREE ACCESS
-
4m 43sIn this video, we will define password attacks, including spraying, brute force, and wordlists. FREE ACCESS
-
2m 26sUpon completion of this video, you will be able to describe various indicators of compromise like account lockout, concurrent session usage, blocked content, impossible travel, resource consumption, out-of-cycle logging, and missing logs. FREE ACCESS
-
30sIn this video, we will summarize the key concepts covered in this course. FREE ACCESS
EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE
Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.
Digital badges are yours to keep, forever.