CompTIA Security+ Certification(SY0-501): Social Engineering
0.0 (0 ratings)
Course Ratings are calculated from individual students’ ratings and a variety of other signals, like age of rating and reliability, to ensure that they reflect course quality fairly and accurately.
29 students enrolled

CompTIA Security+ Certification(SY0-501): Social Engineering

Everything you need to know about Social Engineering to best prepare for your CompTIA Security+ Certification Exam
0.0 (0 ratings)
Course Ratings are calculated from individual students’ ratings and a variety of other signals, like age of rating and reliability, to ensure that they reflect course quality fairly and accurately.
29 students enrolled
Created by John Wiley & Sons
Last updated 7/2019
English
English [Auto]
Current price: $29.99 Original price: $49.99 Discount: 40% off
2 days left at this price!
30-Day Money-Back Guarantee
This course includes
  • 1.5 hours on-demand video
  • 2 articles
  • 2 downloadable resources
  • Full lifetime access
  • Access on mobile and TV
  • Certificate of Completion
Training 5 or more people?

Get your team access to 4,000+ top Udemy courses anytime, anywhere.

Try Udemy for Business
What you'll learn
  • You will master the basic fundamentals of social engineering.
  • This course is in compliance with the CompTIA Security+ exam.
  • Get ready to pass the Security+ Exam with Sybex's superior review materials based on the CompTIA approved content.
  • Wiley's "Bite-Sized" lessons specifically designed to assist you in mastering the topic.
  • Prepare for your exam with "Smarter Test Prep".
  • Solidify your understanding with Real World Scenarios.
Requirements
  • This course has no prerequesites however a basic understanding of IT fundamentals will be helpful.
Description

Composed from Sybex's best review materials, this course is all you need to help you master one of the topics covered in CompTIA Security+ (SY0-501) exam.

Whether if you are someone who is looking for the 'last minute review' or someone who is looking for an introduction to a topic, this course is perfect for you!

Our bite-sized lessons make it easy for the users to grasp the material quickly.


Exam Objectives covered in this course:

  • 1.2: Compare and contrast types of attacks

  • 3.9: Explain the importance of physical security controls

  • 5.7: Compare and contrast various types of controls

  • 5.8: Given a scenario, carry out data security and privacy practices


Topics Included in the course:

  • Social Engineering

  • Physical Security

  • Privacy

    And more!

Who this course is for:
  • IT students
  • Anyone interested in learning about Social Engineering
  • Students studying for CompTIA Security+ Certification Exam
Course content
Expand all 10 lectures 01:36:07
+ Welcome to the course!
2 lectures 03:30

Welcome to the Social Engineering portion of the CompTIA Security + Certification Exam

Preview 01:08

Tips and Advice for taking the CompTia Security + Certification Exam.

Preview 02:22
+ Introduction to Social Engineering and Other Foes
1 lecture 01:21

You will be introduced to Social Engineering and other foes in this lecture.

Preview 01:21
+ Understanding Social Engineering
2 lectures 23:19

After completing this lecture, students will be able to:

  • Define the types of social engineering attacks

  • List the principles of social engineering

Preview 20:54
Real World Scenario
02:25
Section Quiz
2 questions
+ Understanding Physical Security
2 lectures 35:30

After completing this lecture, students will be able to:

  • Define various forms of physical security

  • Explore implementation of physical security

Physical Security
35:02
Real World Scenario
00:28
Section Quiz
2 questions
+ Understanding Security Control Types
1 lecture 12:13

After completing this lecture, students will be able to:

  • Explore the eight types of security controls

  • Describe control types through an analogy

Types of Security Controls
12:13
Section Quiz
2 questions
+ Data Security and Privacy Practices
2 lectures 20:13

After completing this lecture, students should be able to:

  • Discuss methods to destroy and sanitize sensitive data

  • Discuss data labeling and handling

Data Security and Privacy
14:57

After completing this lecture, students should be able to:

  • Discuss methods to destroy and sanitize sensitive data

  • Discuss data labeling and handling

Wiping a Hard Disk
05:16
Section Quiz
3 questions
+ Final Review!
0 lectures 00:00
Post Assessment
5 questions