CompTIA Sec+ SY0-401, Part 5 of 8: Security and Malware [Deprecated/Replaced]
with expert Ryan Hendricks
Course description
Take your first steps on the road to being a security professional. In this course, security expert Ryan Hendricks gives an overview of the world of threats and vulnerabilities. He will define and differentiate common types of attacks including worms, Trojans and other malware. He’ll also discuss how hackers exploit the low-tech but effective techniques of social engineering in order to gain unauthorized access to enterprise data.
Prerequisites
This course assumes that the user has working knowledge of networks and networking. Ideally, the user should have their CompTIA Network+ certification, but can be replaced with networking experience.
Learning Paths
This course will help you prepare for the following certification and exam:
CompTIA Security+ Certification
SY0-401: CompTIA Security+
Meet the expert
Ryan Hendricks is an experienced instructor who teaches networking and security courses to IT professionals throughout the nation. He currently has the CompTIA Certified Technical Trainer (CTT+ Classroom) and the Cisco Certified Academy Instructor (CCAI) credentials. He holds certifications from (ISC)2, EC-Council, CompTIA, and Cisco. When not on the podium instructing, he delves into IT books, always looking to learn more and keep up with the latest security topics.
Course outline
Security
CIA Triad (17:48)
- Introduction (00:22)
- CIA Triad (01:02)
- Confidentiality (00:56)
- Confidentiality Support (02:13)
- Confidentiality Attacks (01:58)
- Integrity (00:53)
- Integrity Support (02:14)
- Integrity Attacks (01:16)
- Availability (00:28)
- Availability Support (01:40)
- Availability Attacks (01:20)
- CIA Triad (02:50)
- Summary (00:30)
Safety (12:36)
- Introduction (00:19)
- Fences (01:46)
- Fences, Cont. (01:01)
- Lighting (02:02)
- Lighting, Cont. (01:08)
- Locks (00:49)
- Closed-Circuit Television (01:16)
- Escape Plans (01:33)
- Drills (00:44)
- Escape Routes (01:04)
- Testing Controls (00:29)
- Summary (00:19)
Physical Security (25:12)
- Introduction (00:19)
- Hardware Locks (02:05)
- Hardware Locks, Cont. (01:28)
- Mantraps (01:46)
- Video Surveillance (02:07)
- Video Surveillance, Cont. (02:18)
- Fencing (00:59)
- Proximity Readers (01:11)
- Access List (01:12)
- Proper Lighting (00:45)
- Signs (01:27)
- Guards (01:43)
- Barricades (01:40)
- Biometrics (01:14)
- Protected Distribution (01:33)
- Alarms (01:10)
- Motion Dectectors (01:42)
- Summary (00:24)
Malware Types
Types of Malware (18:23)
- Introduction (00:15)
- Adware (01:26)
- Virus (01:39)
- Virus Types (03:07)
- Spyware (01:35)
- Trojan (02:25)
- Rootkits (01:36)
- Backdoors (01:39)
- Logic Bomb (01:15)
- Botnets (01:20)
- Ransomware (01:03)
- Polymorphic Malware (00:39)
- Summary (00:19)
Social Engineering (26:10)
- Introduction (00:26)
- Social Engineering (01:18)
- Shoulder Surfing (01:53)
- Dumpster Diving (01:29)
- Tailgating (01:28)
- Impersonation (02:10)
- Hoaxes (01:11)
- Phishing (01:40)
- Demo: URL Manipulation (04:14)
- Vishing (01:15)
- Spear Phishing (01:08)
- Whaling (00:43)
- Pharming (00:50)
- DNS Poisoning (01:54)
- Principles (03:53)
- Summary (00:30)
Various Attacks (26:17)
- Introduction (00:23)
- Man-in-the-Middle (01:26)
- Denial of Service (DoS) (02:30)
- Distributed Denial of Service (01:03)
- Replay (01:49)
- Smurf Attack (01:40)
- Spoofing (01:20)
- Spam (02:04)
- Spim (00:37)
- Xmas Attack (01:59)
- Privilege Escalation (01:27)
- Malicious Insider Threat (01:00)
- ARP Poisoning (00:00)
- Watering Hole Attack (00:00)
- Transitive Access (00:00)
- Client-Side Attacks (00:00)
- Password Attacks (00:00)
- Typo Squatting/URL Hacking (08:27)
- Summary (00:25)