CompTIA NET+ Cert, Part 10 of 17: Security Threats and Attacks
Interactive

CompTIA NET+ Cert, Part 10 of 17: Security Threats and Attacks

LearnNow Online
Updated Aug 21, 2018

Course description

In this course we are going to provide an overview of the huge number of threats and vulnerabilities that exist in modern networks. We will begin by looking at security concepts such as threats, vulnerabilities, risks, and how to deal with them. We will also look at various attacks and discuss how they work and how you can implement defense mechanisms to minimize risk for your organization.

Each LearnNowOnline training course is made up of Modules (typically an hour in length). Within each module there are Topics (typically 15-30 minutes each) and Subtopics (typically 2-5 minutes each). There is a Post Exam for each Module that must be passed with a score of 70% or higher to successfully and fully complete the course.


Prerequisites

This course assumes the user has some experience with computer hardware, software, and understands the concept of a computer network. The user should have also viewed CompTIA NET+ Cert: Network Security course before viewing this course.


Meet the expert

Patrick Loner

Patrick Loner has certifications for MCSA, MCSE, MCITP, A+, Network+, Security+, and more. He has been working as a Microsoft Certified Trainer, network administrator, and network consultant for over ten years. He has over a decade of experience working with and teaching about Windows networks with client and server operating systems. He has guided many students toward Microsoft and CompTIA certifications. Most recently, he has worked as a freelance trainer and network consultant specializing in Windows Server 2008 and Microsoft Exchange 2007 and Exchange 2010 implementations, design, and upgrades. Patrick continues to branch out now working with and training on Windows Server 2012, Windows 8, Exchange 2013, and System Center Configuration Manager 2012.

Video Runtime

72 Minutes

Time to complete

164 Minutes

Course Outline

Security Threats and Attacks

Security Threats and Attacks (25:13)

  • Introduction (00:22)
  • Physical Security (01:21)
  • Physical Security (Cont.) (01:59)
  • Threats and Vulnerabilities (02:15)
  • Social Engineering Attacks (02:54)
  • Social Engineering Types (01:29)
  • Social Engineering Types 2 (02:16)
  • Social Engineering Types 3 (02:16)
  • Malicious Code Attacks (00:49)
  • Malicious Code Attacks,Types (02:36)
  • Malicious Code Attacks,Types 2 (01:41)
  • Malicious Code Attacks,Types 3 (02:05)
  • Types of Viruses (01:27)
  • Types of Viruses (Cont.) (01:15)
  • Summary (00:21)

Network Attacks (22:00)

  • Introduction (00:16)
  • Buffer Overflow (01:32)
  • Password Attacks (01:18)
  • Types of Password Attacks (01:46)
  • Types of Password Attacks 2 (02:00)
  • IP Spoofing Attacks (01:16)
  • Session Hijacking Attacks (00:35)
  • DoS Attacks (01:34)
  • DDoS Attacks (01:01)
  • Man-in-the-Middle Attacks (01:23)
  • Port Scanning Attack (00:42)
  • Replay Attacks (00:47)
  • FTB Bounce Attacks (00:37)
  • ARP Poisoning Attacks (00:33)
  • Wireless Security (01:04)
  • Wireless Vulnerabilities (01:31)
  • Wireless Vulnerabilities 2 (01:03)
  • Wireless Vulnerabilities 3 (00:52)
  • Wireless Vulnerabilities 4 (00:55)
  • Wireless Vulnerabilities 5 (00:41)
  • Summary (00:25)

Threat Mitigation (25:03)

  • Introduction (00:21)
  • Software Updates (02:05)
  • Patch Management (01:30)
  • Antivirus Software (01:48)
  • Internet Email Virus Protectio (01:27)
  • Anti-Spam Software (03:24)
  • Security Policies (01:18)
  • Common Security Policy Types (01:11)
  • Security Policy Types (cont.) (01:14)
  • Security Incident Management (01:38)
  • IRPs (01:12)
  • Change Management (02:37)
  • Employee Education (02:55)
  • User Security Responsibilities (01:55)
  • Summary (00:20)
;