CompTIA Security+: Threat Actors, Intelligence Sources, & Vulnerabilities
CompTIA
| Intermediate
- 13 videos | 50m 36s
- Includes Assessment
- Earns a Badge
When guarding against threats and vulnerabilities, it is important to understand the various sources of threat and how to leverage intelligence sources to mitigate them. In this course, you'll learn about threat actors and threat vectors, attributes of threat actors and agents, threat intelligence sources such as OSINT and the dark web, and various research sources. Then, you'll move on to examine different types of vulnerabilities, including cloud-based and on-premises, zero-day, weak configurations, third-party risks, improper patch management, and legacy platforms. Finally, you'll examine various impacts such as data loss and data breach, as you prepare for the CompTIA Security+ SY0-601 certification exam.
WHAT YOU WILL LEARN
-
Discover the key concepts covered in this courseDescribe threats and threat actors like privileged insiders, state actors, hacktivists, script kiddies, and criminal syndicatesDefine the attributes of actors such as internal, external, sophistication, capability, resources, funding, intent, and motivationCompare threat vectors as in direct access, wireless, e-mail, supply chain, social media, removable media, and cloud-basedSurvey intelligence sources like osint, proprietary, vulnerability databases, public or private information, sharing centers, and the dark webDescribe research sources as in vendor web sites, vulnerability feeds, conferences, academic journals, and request for commentsCompare cloud-based vs. on-premise vulnerabilities
-
Describe zero-day vulnerabilities as in computer-software threats that are unknown to, or unaddressed by, those who should be interested in mitigating the vulnerability, including the vendor of the target softwareSurvey weak configurations such as open permissions, unsecured root accounts, errors, weak encryption, and unsecure protocolsDefine third-party risks including partner or vendor management, system integration, lack of vendor support, supply chain risk, and outsourced code developmentDescribe improper patch management for firmware, operating systems, and applicationsRecognize legacy platforms and varied impacts like data leakage and loss, data breaches, data exfiltration, and identity theftDiscover the key concepts covered in this course
IN THIS COURSE
-
1m 29s
-
9m 27sAfter completing this video, you will be able to describe threats and threat actors, such as privileged insiders, state actors, hacktivists, script kiddies, and criminal syndicates. FREE ACCESS
-
5m 35sIn this video, you will learn how to define the attributes of actors such as internal, external, sophistication, capability, resources, funding, intent, and motivation. FREE ACCESS
-
3m 2sFind out how to compare threat vectors such as direct access, wireless, e-mail, supply chain, social media, removable media, and cloud-based. FREE ACCESS
-
7m 45sLearn how to survey intelligence sources like OSINT, proprietary, vulnerability databases, public or private information, sharing centers, and the dark web. FREE ACCESS
-
3m 35sUpon completion of this video, you will be able to describe research sources such as vendor web sites, vulnerability feeds, conferences, academic journals, and request for comments. FREE ACCESS
-
4m 10sDuring this video, you will learn how to compare cloud-based and on-premise vulnerabilities. FREE ACCESS
-
1m 49sUpon completion of this video, you will be able to describe zero-day vulnerabilities as computer-software threats that are unknown to, or unaddressed by, those who should be interested in mitigating the vulnerability, including the vendor of the target software. FREE ACCESS
-
5m 13sFind out how to survey weak configurations such as open permissions, unsecured root accounts, errors, weak encryption, and insecure protocols. FREE ACCESS
-
3m 24sIn this video, you will define third-party risks including partner or vendor management, system integration, lack of vendor support, supply chain risk, and outsourced code development. FREE ACCESS
-
1m 55sUpon completion of this video, you will be able to describe improper patch management for firmware, operating systems, and applications. FREE ACCESS
-
2m 28sUpon completion of this video, you will be able to recognize legacy platforms and their varied impacts like data leakage and loss, data breaches, data exfiltration, and identity theft. FREE ACCESS
-
44s
EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE
Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.
Digital badges are yours to keep, forever.