Learn your way! Get started

CompTIA Security+, Part 5: Security and Malware

with expert Ryan Hendricks


Watch trailer

CompTIA Security+, Part 5: Security and Malware  Trailer

Course at a glance

Included in these subscriptions:

  • Dev & IT Pro Video
  • Dev & IT Pro Power Pack
  • Power Pack Plus

Release date Release date 4/8/2016
Level Level Intermediate
Runtime Runtime 2h 6m
Closed captioning Closed captioning Included
Transcript Transcript Included
eBooks / courseware eBooks / courseware N/A
Hands-on labs Hands-on labs N/A
Sample code Sample code N/A
Exams Exams Included


Enterprise Solutions
Enterprise Solutions

Need reporting, custom learning tracks, or SCORM? Learn More



Course description

Take your first steps on the road to being a security professional. In this course, security expert Ryan Hendricks gives an overview of the world of threats and vulnerabilities. He will define and differentiate common types of attacks including worms, Trojans and other malware. He’ll also discuss how hackers exploit the low-tech but effective techniques of social engineering in order to gain unauthorized access to enterprise data.

Prerequisites

This course assumes that the user has working knowledge of networks and networking. Ideally, the user should have their CompTIA Network+ certification, but can be replaced with networking experience.

Learning Paths

This course will help you prepare for the following certification and exam:
CompTIA Security+ Certification

Meet the expert

Ryan Hendricks Ryan Hendricks is an experienced instructor who teaches networking and security courses to IT professionals throughout the nation. He currently has the CompTIA Certified Technical Trainer (CTT+ Classroom) and the Cisco Certified Academy Instructor (CCAI) credentials. He holds certifications from (ISC)2, EC-Council, CompTIA, and Cisco. When not on the podium instructing, he delves into IT books, always looking to learn more and keep up with the latest security topics.


Course outline



Security

CIA Triad (17:48)
  • Introduction (00:22)
  • CIA Triad (01:02)
  • Confidentiality (00:56)
  • Confidentiality Support (02:13)
  • Confidentiality Attacks (01:58)
  • Integrity (00:53)
  • Integrity Support (02:14)
  • Integrity Attacks (01:16)
  • Availability (00:28)
  • Availability Support (01:40)
  • Availability Attacks (01:20)
  • CIA Triad (02:50)
  • Summary (00:30)
Safety (12:36)
  • Introduction (00:19)
  • Fences (01:46)
  • Fences, Cont. (01:01)
  • Lighting (02:02)
  • Lighting, Cont. (01:08)
  • Locks (00:49)
  • Closed-Circuit Television (01:16)
  • Escape Plans (01:33)
  • Drills (00:44)
  • Escape Routes (01:04)
  • Testing Controls (00:29)
  • Summary (00:19)
Physical Security (25:12)
  • Introduction (00:19)
  • Hardware Locks (02:05)
  • Hardware Locks, Cont. (01:28)
  • Mantraps (01:46)
  • Video Surveillance (02:07)
  • Video Surveillance, Cont. (02:18)
  • Fencing (00:59)
  • Proximity Readers (01:11)
  • Access List (01:12)
  • Proper Lighting (00:45)
  • Signs (01:27)
  • Guards (01:43)
  • Barricades (01:40)
  • Biometrics (01:14)
  • Protected Distribution (01:33)
  • Alarms (01:10)
  • Motion Dectectors (01:42)
  • Summary (00:24)

Malware Types

Types of Malware (18:23)
  • Introduction (00:15)
  • Adware (01:26)
  • Virus (01:39)
  • Virus Types (03:07)
  • Spyware (01:35)
  • Trojan (02:25)
  • Rootkits (01:36)
  • Backdoors (01:39)
  • Logic Bomb (01:15)
  • Botnets (01:20)
  • Ransomware (01:03)
  • Polymorphic Malware (00:39)
  • Summary (00:19)
Social Engineering (26:10)
  • Introduction (00:26)
  • Social Engineering (01:18)
  • Shoulder Surfing (01:53)
  • Dumpster Diving (01:29)
  • Tailgating (01:28)
  • Impersonation (02:10)
  • Hoaxes (01:11)
  • Phishing (01:40)
  • Demo: URL Manipulation (04:14)
  • Vishing (01:15)
  • Spear Phishing (01:08)
  • Whaling (00:43)
  • Pharming (00:50)
  • DNS Poisoning (01:54)
  • Principles (03:53)
  • Summary (00:30)
Various Attacks (26:17)
  • Introduction (00:23)
  • Man-in-the-Middle (01:26)
  • Denial of Service (DoS) (02:30)
  • Distributed Denial of Service (01:03)
  • Replay (01:49)
  • Smurf Attack (01:40)
  • Spoofing (01:20)
  • Spam (02:04)
  • Spim (00:37)
  • Xmas Attack (01:59)
  • Privilege Escalation (01:27)
  • Malicious Insider Threat (01:00)
  • ARP Poisoning (00:00)
  • Watering Hole Attack (00:00)
  • Transitive Access (00:00)
  • Client-Side Attacks (00:00)
  • Password Attacks (00:00)
  • Typo Squatting/URL Hacking (08:27)
  • Summary (00:25)