Learn your way! Get started

CompTIA Sec+ SY0-501, Part 1 of 9: Overview and Malware

with expert Jason Dion


Watch trailer


Course at a glance

Included in these subscriptions:

  • Dev & IT Pro Video
  • Dev & IT Pro Power Pack

Release date 9/9/2019
Level Beginner
Runtime 1h 45m
Closed captioning N/A
Transcript N/A
eBooks / courseware N/A
Hands-on labs N/A
Sample code Included
Exams Included


Enterprise Solutions

Need reporting, custom learning tracks, or SCORM? Learn More



Course description

In this course we will discuss an overview of Security+. We will discuss Malware, ransomware and malware infections and how to avoid interception and privilege escalation for the SY0-501 Exam.

Prerequisites

• Basic familiarity with computer networks, administration, and security is helpful (But, all required information will be covered during the course) • Completion of the CompTIA A+ and Network+ certifications (Helpful, but not required)

Meet the expert

Jason Dion, CISSP No. 349867, is a professor at University of Maryland University College with multiple information technology professional certifications, including Certified Information Systems Security Professional (CISSP), Certified Ethical Hacker (CEH), Certified Network Defense Architect (CNDA), Digital Forensic Examiner (DFE), Digital Media Collector (DMC), CySA+, Security+, Network+, A+, PRINCE2 Practitioner, and ITIL. He holds a Masters of Science degree in Information Technology with a specialization in Information Assurance

Course outline



Overview and Malware

Overview Of Security (27:28)
  • Introduction (00:08)
  • Welcome (03:43)
  • Overview of Security (02:56)
  • CIA Triad (03:54)
  • AAA of Security (03:06)
  • Security Threats (02:56)
  • Mitigating Threats (02:28)
  • Hackers (04:53)
  • Threat Actors (03:12)
  • Summary (00:08)
Malware (18:33)
  • Introduction (00:08)
  • Malware (00:40)
  • Viruses (06:21)
  • Worms (02:10)
  • Trojan Horse (02:49)
  • Demo: Virus and Trojan (06:16)
  • Summary (00:08)
Ransomware (13:55)
  • Introduction (00:08)
  • Ransomware (02:30)
  • Spyware (02:39)
  • Rootkits (03:29)
  • Spam (02:56)
  • Summary of Malware (02:02)
  • Summary (00:08)
Malware Infections (20:15)
  • Introduction (00:08)
  • Malware Infection (04:12)
  • Common Delivery Methods (04:27)
  • Phishing (05:19)
  • Botnets and Zombies (03:30)
  • Active Interception and Privilege Escalation (02:28)
  • Summary (00:08)
Privilege Escalation (24:55)
  • Introduction (00:08)
  • Privilege Escalation (05:41)
  • Backdoors and Logic Bombs (03:48)
  • Symptoms of Infection (04:10)
  • Removing Malware (05:02)
  • Preventing Malware (05:56)
  • Summary (00:08)