Course description
** this course is updated for current certification N10-008 with parts 1 through 7 starting at https://www.learnnowonline.com/course/npe**
In this course we are going to provide an overview of the huge number of threats and vulnerabilities that exist in modern networks. We will begin by looking at security concepts such as threats, vulnerabilities, risks, and how to deal with them. We will also look at various attacks and discuss how they work and how you can implement defense mechanisms to minimize risk for your organization.
Prerequisites
This course assumes the user has some experience with computer hardware, software, and understands the concept of a computer network. The user should have also viewed CompTIA NET+ Cert: Network Security course before viewing this course.
Learning Paths
This course will help you prepare for the following certification and exam:
CompTIA Net+ Certification
N10-006: CompTIA Net+ Certification
Meet the expert
Patrick Loner has certifications for MCSA, MCSE, MCITP, A+, Network+, Security+, and more. He has been working as a Microsoft Certified Trainer, network administrator, and network consultant for over ten years. He has over a decade of experience working with and teaching about Windows networks with client and server operating systems. He has guided many students toward Microsoft and CompTIA certifications. Most recently, he has worked as a freelance trainer and network consultant specializing in Windows Server 2008 and Microsoft Exchange 2007 and Exchange 2010 implementations, design, and upgrades. Patrick continues to branch out now working with and training on Windows Server 2012, Windows 8, Exchange 2013, and System Center Configuration Manager 2012.
Course outline
Security Threats and Attacks
Security Threats and Attacks (25:13)
- Introduction (00:22)
- Physical Security (01:21)
- Physical Security (Cont.) (01:59)
- Threats and Vulnerabilities (02:15)
- Social Engineering Attacks (02:54)
- Social Engineering Types (01:29)
- Social Engineering Types 2 (02:16)
- Social Engineering Types 3 (02:16)
- Malicious Code Attacks (00:49)
- Malicious Code Attacks,Types (02:36)
- Malicious Code Attacks,Types 2 (01:41)
- Malicious Code Attacks,Types 3 (02:05)
- Types of Viruses (01:27)
- Types of Viruses (Cont.) (01:15)
- Summary (00:21)
Network Attacks (22:00)
- Introduction (00:16)
- Buffer Overflow (01:32)
- Password Attacks (01:18)
- Types of Password Attacks (01:46)
- Types of Password Attacks 2 (02:00)
- IP Spoofing Attacks (01:16)
- Session Hijacking Attacks (00:35)
- DoS Attacks (01:34)
- DDoS Attacks (01:01)
- Man-in-the-Middle Attacks (01:23)
- Port Scanning Attack (00:42)
- Replay Attacks (00:47)
- FTB Bounce Attacks (00:37)
- ARP Poisoning Attacks (00:33)
- Wireless Security (01:04)
- Wireless Vulnerabilities (01:31)
- Wireless Vulnerabilities 2 (01:03)
- Wireless Vulnerabilities 3 (00:52)
- Wireless Vulnerabilities 4 (00:55)
- Wireless Vulnerabilities 5 (00:41)
- Summary (00:25)
Threat Mitigation (25:03)
- Introduction (00:21)
- Software Updates (02:05)
- Patch Management (01:30)
- Antivirus Software (01:48)
- Internet Email Virus Protectio (01:27)
- Anti-Spam Software (03:24)
- Security Policies (01:18)
- Common Security Policy Types (01:11)
- Security Policy Types (cont.) (01:14)
- Security Incident Management (01:38)
- IRPs (01:12)
- Change Management (02:37)
- Employee Education (02:55)
- User Security Responsibilities (01:55)
- Summary (00:20)