In this course, you’ll learn about the various threats faced by social engineering techniques like phishing, pharming, and identity fraud. First, you’ll learn about potential indicators of compromise used to determine the types of attack to systems, applications, and networks. Next, you’ll discover the various intelligence sources used to identify and combat these threats. Finally, you’ll become familiar with various penetration testing tools and techniques. When you’re finished with this course, you’ll have the skills and knowledge needed to pass the Threats, Attacks, and Vulnerabilities section of Security+, along with the skills needed to help protect your company from attacks both internal and external.
Overview
Coursera Spring Sale
40% Off Coursera Plus Annual!
Grab it
In this course, you’ll learn about the various threats faced by social engineering techniques like phishing, pharming, and identity fraud. First, you’ll learn about potential indicators of compromise used to determine the types of attack to systems, applications, and networks. Next, you’ll discover the various intelligence sources used to identify and combat these threats. Finally, you’ll become familiar with various penetration testing tools and techniques. When you’re finished with this course, you’ll have the skills and knowledge needed to pass the Threats, Attacks, and Vulnerabilities section of Security+, along with the skills needed to help protect your company from attacks both internal and external.
Syllabus
- Course Overview 1min
- Comparing Different Types of Social Engineering Techniques 48mins
- Analyzing Malware and Other Attacks 49mins
- Recognizing Application Attacks 39mins
- Identifying Network Attacks 37mins
- Distinguishing Threat Actors, Vectors, and Intelligence Sources 40mins
- Understanding Vulnerabilities and Security Risks 34mins
- Defining Security Assessment Techniques 35mins
- Defining Penetration Testing 23mins
Taught by
Christopher Rees