Threats, Attacks, and Vulnerabilities
Learning Objective:
- Compare and contrast different types of social engineering techniques
- Given a scenario, analyze potential indicators to determine the type of attack
- Analyze potential indicators associated with application and network attacks
- Explain different threat actors, vectors, and intelligence sources
- Explain the security concerns associated with various types of vulnerabilities
- Explain the techniques used in penetration testing
Topics:
- Security Policy
- Threat Actors
- Social Engineering
- Phishing & Types of Malware
- Trojans and Spyware
- Security Control Types
- Defence in Depth
- Frameworks and Compliance
- Vulnerability Scanning and Pen Tests
- Security Assessment Techniques
- Pen Testing Concepts
- Vulnerability Scanning Concepts
- Exploitation Frameworks