CompTIA Security+, Part 5 of 8: Security and Malware
interactive

CompTIA Security+, Part 5 of 8: Security and Malware

LearnNow Online
Updated Dec 04, 2024
Course Description

Course description

Take your first steps on the road to being a security professional. In this course, security expert Ryan Hendricks gives an overview of the world of threats and vulnerabilities. He will define and differentiate common types of attacks including worms, Trojans and other malware. He’ll also discuss how hackers exploit the low-tech but effective techniques of social engineering in order to gain unauthorized access to enterprise data.

Each LearnNowOnline training course is made up of Modules (typically an hour in length). Within each module there are Topics (typically 15-30 minutes each) and Subtopics (typically 2-5 minutes each). There is a Post Exam for each Module that must be passed with a score of 70% or higher to successfully and fully complete the course.


Prerequisites

This course assumes that the user has working knowledge of networks and networking. Ideally, the user should have their CompTIA Network+ certification, but can be replaced with networking experience.


Meet the expert

Ryan Hendricks

Ryan Hendricks is an experienced instructor who teaches networking and security courses to IT professionals throughout the nation. He currently has the CompTIA Certified Technical Trainer (CTT+ Classroom) and the Cisco Certified Academy Instructor (CCAI) credentials. He holds certifications from (ISC)2, EC-Council, CompTIA, and Cisco. When not on the podium instructing, he delves into IT books, always looking to learn more and keep up with the latest security topics.

 

Video Runtime

126 Minutes

Time to complete

166 Minutes

 

Course Outline

Security

CIA Triad (17:48)

  • Introduction (00:22)
  • CIA Triad (01:02)
  • Confidentiality (00:56)
  • Confidentiality Support (02:13)
  • Confidentiality Attacks (01:58)
  • Integrity (00:53)
  • Integrity Support (02:14)
  • Integrity Attacks (01:16)
  • Availability (00:28)
  • Availability Support (01:40)
  • Availability Attacks (01:20)
  • CIA Triad (02:50)
  • Summary (00:30)

Safety (12:36)

  • Introduction (00:19)
  • Fences (01:46)
  • Fences, Cont. (01:01)
  • Lighting (02:02)
  • Lighting, Cont. (01:08)
  • Locks (00:49)
  • Closed-Circuit Television (01:16)
  • Escape Plans (01:33)
  • Drills (00:44)
  • Escape Routes (01:04)
  • Testing Controls (00:29)
  • Summary (00:19)

Physical Security (25:12)

  • Introduction (00:19)
  • Hardware Locks (02:05)
  • Hardware Locks, Cont. (01:28)
  • Mantraps (01:46)
  • Video Surveillance (02:07)
  • Video Surveillance, Cont. (02:18)
  • Fencing (00:59)
  • Proximity Readers (01:11)
  • Access List (01:12)
  • Proper Lighting (00:45)
  • Signs (01:27)
  • Guards (01:43)
  • Barricades (01:40)
  • Biometrics (01:14)
  • Protected Distribution (01:33)
  • Alarms (01:10)
  • Motion Dectectors (01:42)
  • Summary (00:24)
Malware Types

Types of Malware (18:23)

  • Introduction (00:15)
  • Adware (01:26)
  • Virus (01:39)
  • Virus Types (03:07)
  • Spyware (01:35)
  • Trojan (02:25)
  • Rootkits (01:36)
  • Backdoors (01:39)
  • Logic Bomb (01:15)
  • Botnets (01:20)
  • Ransomware (01:03)
  • Polymorphic Malware (00:39)
  • Summary (00:19)

Social Engineering (26:10)

  • Introduction (00:26)
  • Social Engineering (01:18)
  • Shoulder Surfing (01:53)
  • Dumpster Diving (01:29)
  • Tailgating (01:28)
  • Impersonation (02:10)
  • Hoaxes (01:11)
  • Phishing (01:40)
  • Demo: URL Manipulation (04:14)
  • Vishing (01:15)
  • Spear Phishing (01:08)
  • Whaling (00:43)
  • Pharming (00:50)
  • DNS Poisoning (01:54)
  • Principles (03:53)
  • Summary (00:30)

Various Attacks (26:17)

  • Introduction (00:23)
  • Man-in-the-Middle (01:26)
  • Denial of Service (DoS) (02:30)
  • Distributed Denial of Service (01:03)
  • Replay (01:49)
  • Smurf Attack (01:40)
  • Spoofing (01:20)
  • Spam (02:04)
  • Spim (00:37)
  • Xmas Attack (01:59)
  • Privilege Escalation (01:27)
  • Malicious Insider Threat (01:00)
  • ARP Poisoning (00:00)
  • Watering Hole Attack (00:00)
  • Transitive Access (00:00)
  • Client-Side Attacks (00:00)
  • Password Attacks (00:00)
  • Typo Squatting/URL Hacking (08:27)
  • Summary (00:25)