Learn your way! Get started

CompTIA Sec+ SY0-401, Part 5 of 8: Security and Malware [Deprecated/Replaced]

with expert Ryan Hendricks


Watch trailer


Course at a glance

Included in these subscriptions:

  • Dev & IT Pro Video
  • Dev & IT Pro Power Pack

Release date 4/8/2016
Level Intermediate
Runtime 2h 6m
Closed captioning Included
Transcript Included
eBooks / courseware N/A
Hands-on labs N/A
Sample code N/A
Exams Included


Enterprise Solutions

Need reporting, custom learning tracks, or SCORM? Learn More



Course description

Take your first steps on the road to being a security professional. In this course, security expert Ryan Hendricks gives an overview of the world of threats and vulnerabilities. He will define and differentiate common types of attacks including worms, Trojans and other malware. He’ll also discuss how hackers exploit the low-tech but effective techniques of social engineering in order to gain unauthorized access to enterprise data.

Prerequisites

This course assumes that the user has working knowledge of networks and networking. Ideally, the user should have their CompTIA Network+ certification, but can be replaced with networking experience.

Learning Paths

This course will help you prepare for the following certification and exam:
CompTIA Security+ Certification
SY0-401: CompTIA Security+

Meet the expert

Ryan Hendricks is an experienced instructor who teaches networking and security courses to IT professionals throughout the nation. He currently has the CompTIA Certified Technical Trainer (CTT+ Classroom) and the Cisco Certified Academy Instructor (CCAI) credentials. He holds certifications from (ISC)2, EC-Council, CompTIA, and Cisco. When not on the podium instructing, he delves into IT books, always looking to learn more and keep up with the latest security topics.

Course outline



Security

CIA Triad (17:48)
  • Introduction (00:22)
  • CIA Triad (01:02)
  • Confidentiality (00:56)
  • Confidentiality Support (02:13)
  • Confidentiality Attacks (01:58)
  • Integrity (00:53)
  • Integrity Support (02:14)
  • Integrity Attacks (01:16)
  • Availability (00:28)
  • Availability Support (01:40)
  • Availability Attacks (01:20)
  • CIA Triad (02:50)
  • Summary (00:30)
Safety (12:36)
  • Introduction (00:19)
  • Fences (01:46)
  • Fences, Cont. (01:01)
  • Lighting (02:02)
  • Lighting, Cont. (01:08)
  • Locks (00:49)
  • Closed-Circuit Television (01:16)
  • Escape Plans (01:33)
  • Drills (00:44)
  • Escape Routes (01:04)
  • Testing Controls (00:29)
  • Summary (00:19)
Physical Security (25:12)
  • Introduction (00:19)
  • Hardware Locks (02:05)
  • Hardware Locks, Cont. (01:28)
  • Mantraps (01:46)
  • Video Surveillance (02:07)
  • Video Surveillance, Cont. (02:18)
  • Fencing (00:59)
  • Proximity Readers (01:11)
  • Access List (01:12)
  • Proper Lighting (00:45)
  • Signs (01:27)
  • Guards (01:43)
  • Barricades (01:40)
  • Biometrics (01:14)
  • Protected Distribution (01:33)
  • Alarms (01:10)
  • Motion Dectectors (01:42)
  • Summary (00:24)

Malware Types

Types of Malware (18:23)
  • Introduction (00:15)
  • Adware (01:26)
  • Virus (01:39)
  • Virus Types (03:07)
  • Spyware (01:35)
  • Trojan (02:25)
  • Rootkits (01:36)
  • Backdoors (01:39)
  • Logic Bomb (01:15)
  • Botnets (01:20)
  • Ransomware (01:03)
  • Polymorphic Malware (00:39)
  • Summary (00:19)
Social Engineering (26:10)
  • Introduction (00:26)
  • Social Engineering (01:18)
  • Shoulder Surfing (01:53)
  • Dumpster Diving (01:29)
  • Tailgating (01:28)
  • Impersonation (02:10)
  • Hoaxes (01:11)
  • Phishing (01:40)
  • Demo: URL Manipulation (04:14)
  • Vishing (01:15)
  • Spear Phishing (01:08)
  • Whaling (00:43)
  • Pharming (00:50)
  • DNS Poisoning (01:54)
  • Principles (03:53)
  • Summary (00:30)
Various Attacks (26:17)
  • Introduction (00:23)
  • Man-in-the-Middle (01:26)
  • Denial of Service (DoS) (02:30)
  • Distributed Denial of Service (01:03)
  • Replay (01:49)
  • Smurf Attack (01:40)
  • Spoofing (01:20)
  • Spam (02:04)
  • Spim (00:37)
  • Xmas Attack (01:59)
  • Privilege Escalation (01:27)
  • Malicious Insider Threat (01:00)
  • ARP Poisoning (00:00)
  • Watering Hole Attack (00:00)
  • Transitive Access (00:00)
  • Client-Side Attacks (00:00)
  • Password Attacks (00:00)
  • Typo Squatting/URL Hacking (08:27)
  • Summary (00:25)