Security+ Certification - Threats and Vulnerabilities Domain
3.8 (6 ratings)
Instead of using a simple lifetime average, Udemy calculates a course's star rating by considering a number of different factors such as the number of ratings, the age of ratings, and the likelihood of fraudulent ratings.
578 students enrolled
Wishlisted Wishlist

Please confirm that you want to add Security+ Certification - Threats and Vulnerabilities Domain to your Wishlist.

Add to Wishlist

Security+ Certification - Threats and Vulnerabilities Domain

Pass the 'Threats and Vulnerabilities' section of the Security+ exam.
3.8 (6 ratings)
Instead of using a simple lifetime average, Udemy calculates a course's star rating by considering a number of different factors such as the number of ratings, the age of ratings, and the likelihood of fraudulent ratings.
578 students enrolled
Created by Chad Russell
Last updated 2/2017
English
English [Auto-generated]
Price: $20
30-Day Money-Back Guarantee
Includes:
  • 3 hours on-demand video
  • Full lifetime access
  • Access on mobile and TV
  • Certificate of Completion
What Will I Learn?
  • Comprehend Cyber Security
  • Gain an in-depth understanding of the 'Threats and Vulnerabilities' Domain of the Security+ Exam.
View Curriculum
Requirements
  • Students should have basic knowledge of operating systems such as Windows and Linux.
  • No special software is needed for this course.
Description

This course is for beginners and IT pros looking to get certified and land an entry level Cyber Security position paying upwards of six figures!  There are currently over a million Cyber Security job openings global and demand is greatly outpacing supply which means more opportunity, job security and higher pay for you! 

The Security+ exam covers six domains and this course focuses on the third domain which is 'Threats and Vulnerabilities'' domain.   

  • Malware
  • Cyber attacks
  • DNS Security
  • Social engineering
  • Wireless attacks
  • Advanced wireless attacks
  • XSS - Cross-Site Scripting attacks
  • Buffer overflows
  • Security testing tools
  • SIEM - security information and events management
  • Platform hardening and baselining
  • Honeypots and honey nets
  • Vulnerability scanning and pen testing
  • Threat modeling

In Malware section we will define Malware categories and characteristics and talk through protective countermeasures to keep networks, systems and data safe from compromise. 

There are so many different types of attacks sometimes it can be challenging to address them all within the context of our various lessons.   So in the Cyber Attacks lesson I’ve pulled together some attack types that haven’t necessarily been covered in the other sections.  When the internet was originally architected services such as DNS weren’t necessarily designed with security in mind.   You will learn about DNS vulnerabilities, attacks and DNS Security protocols as part of the DNS Security lesson 

Understand social engineering in the context of information security, which refers to psychological manipulation of people into performing actions or divulging confidential information.You will learn the basics of modern wireless security protocols, vulnerabilities, attacks and defense mechanisms in the wireless attacks lesson.Wireless networks represent the softest and most common entry point for hackers.   We will talk about advanced wireless attacks and how to prevent them.  

XSS and Injection are some of the top techniques used by attackers to compromise websites and user data. Learn how to test for XSS vulnerabilities, identify exploits and protect against them. Attack applications using buffer overflow techniques in order to execute arbitrary malicious code and we will also identify ways to mitigate these attacks.  

There are practically an infinite number of security testing tools available both free and paid.   In the security testing tools lesson we will begin to scratch the surface of some of these common tools and identify how we categorize them and their uses. Management of logs are a key component of operational security.  These days the velocity, variety and volume of data collected via logs has catapulted log management into the realm of Big Data.   You will learn how to effectively manage these logs and derive useful security information from them in the lesson on SIEM.

Minimizing the attack surface area of operating systems, databases and applications is a key tenet of operational security.   I will show you techniques for OS/DB and App hardening.  Luring attackers away from critical data and studying their behavior can help us to protect the data that matters most.  You will learn how to use honeypots to tie up attackers and find out what they are up to. 

Vulnerability Assessment and Pen Testing are often terms that are used interchangeably.   In this section we will walk through some of the differences and commonalities between the two.  


Who is the target audience?
  • This course is intended for absolute beginners and IT professionals looking to make the move into the Cyber Security field. No programming experience or prior security knowledge is required. A basic understanding of networking and TCP/IP is helpful. This course is intended for anyone who is interested in a career in Cyber Security
Students Who Viewed This Course Also Viewed
Curriculum For This Course
20 Lectures
02:55:08
+
Security Threats and Attacks
10 Lectures 01:36:37

Malware
14:25

Cyber Attacks
17:54

Social Engineering
09:27

XSS - Cross-Site Scripting Attacks
09:10

DNS Security
04:45

Buffer Overflows - Part 1
12:38

Buffer Overflows - Part 2
11:15

Threat Modeling
08:29

Hands-On Creating Your Own Virus Using JPS Virus Maker
03:36
+
Proactive Security
3 Lectures 19:15
Vulnerability Scanning and Pen Testing
09:25

Platform Hardening and Baselining
08:20

Hands-On Scanning with OpenVAS
01:30
+
Wireless Security
3 Lectures 31:32

Advanced Wireless Attacks
14:46

Hands-On Hacking Wireless with Aircrack and Reaver
08:28
+
Incident Response
4 Lectures 27:44
Honeypots and Honeynets
06:36

Security Information and Event Management
12:29

Hands-On Honeypots with Kippo
06:50

About the Instructor
Chad Russell
3.8 Average rating
1,124 Reviews
22,924 Students
24 Courses
Join the Cyber Security Industry in 2016!

Instructor Bio – Chad Russell

Join the Cyber Security Industry in 2017!

If you are interested in starting a career in the Cyber Security Industry 2016 is the time! 

Learning the fundamentals of Cyber Security provides you with  a powerful and very useful set of skills.  Study Penetration Testing and Ethical Hacking and learn to think like a hacker so you can better defend your networks and data.   

Jobs in Cyber Security are plentiful, and getting Security+ Certified will give you a strong background to more easily pick up and tackle more advanced exams such as the Certified Ethical Hacker and CISSP certifications.  

Get certified and land an entry level Cyber Security position paying upwards of six figures!  There are currently over a million Cyber Security job openings global and demand is greatly outpacing supply which means more opportunity, job security and higher pay for you!   

But, don't take my word for it...please take a look at the FREE previews (they are available in all my courses) and see for yourself.  This year I have partnered with webofsecurity.com, a premier provider of ‘All Things Information Security’ to bring you a fantastic suite of Cyber Security certification training to help you get into the hottest industry in IT. 

About me:

Hello, I’m Chad Russell.  I’ve been in the CyberSecurity industry for over 15 years.  I’ve taught Microsoft Engineering courses as a Certified trainer, I’ve managed teams of security engineers and analysts for an internet banking provider, I’ve been an information security consultant working for companies including SAP, Microsoft and Oracle.   

I lead and conduct 'Security Risk Assessments' for customers throughout North America with an emphasis on cloud security, identity governance, network security, social engineering, mobile security, breach assessments, database security and access management.  

Over the past 15 years I've held numerous certifications including CISSP, CCNP, MCSE and MCDBA certifications and have a B.S. in Computer Science from Excelsior College  I can help you get certified and get ahead!