Autoplay
Autocomplete
Previous Lesson
Complete and Continue
CompTIA Security+ 701
Training Overview
Description of Training
Introduction
Introduction (1:49)
1.1 Threats Attacks and Vulnerabilities
Smishing (3:28)
Phising (4:31)
Vishing (3:16)
What is a SPAM (4:26)
SPIT and SPIM (2:54)
Spear Phishing (4:26)
Dumpster Diving (2:04)
Shoulder Surfing (2:39)
Pharming (2:17)
Tailgating (2:06)
Eliciting Information (3:31)
Whaling (2:35)
Identity Theft (5:25)
Invoice Scams (2:03)
Credential Harvesting (2:54)
Reconnaissance (4:30)
Hoax (2:00)
Impresonation (3:16)
Watering Hole Attack (2:45)
Typo Sqatting (2:31)
Pretexting (2:15)
Influence Campaigns (3:26)
Reasons for Effectivness - Principles (5:26)
1.2 Given a scenario, analyze potential indicators
Worms (3:42)
Trojans (3:51)
Potentially Unwanted Programs (PUPs) (7:17)
Fileless Virus (6:44)
Command and Control Center (3:39)
Bots (5:59)
Crypto Malware (4:27)
Logic Bombs (5:17)
Spywares (3:36)
Keyloggers (5:42)
Remote Access Trojan - RAT (5:42)
Root Kits (4:13)
Backdoors (4:31)
Password Attacks (1:21)
Dictionary Attack (2:58)
Brute force attacks (6:55)
Password Spray Attacks (3:16)
Rainbow Attacks (5:16)
Plain Text Attacks (2:56)
Physical Attacks (1:57)
Malicious Universal Serial bus Cable (4:41)
Card Cloning (5:37)
Malicious Flash Drives (7:40)
Card Cloning (5:37)
Skimming (8:07)
Adversarial Artificial intelligence (2:36)
Security of Machine Learning Algorithms (5:13)
Supply chain Attacks (6:00)
Cloud Based Vs On premises Attacks (5:07)
Cryptographics Attacks (2:40)
Birthday Attacks (2:54)
Collision (3:13)
Downgrade Attacks (3:29)
Audio Version of the Training
Audio Download
Introduction
Lesson content locked
If you're already enrolled,
you'll need to login
.
Enroll in Course to Unlock