Threats, Attacks, and Vulnerabilities

Learning Objective:
  • Compare and contrast different types of social engineering techniques
  • Given a scenario, analyze potential indicators to determine the type of attack
  • Analyze potential indicators associated with application and network attacks
  • Explain different threat actors, vectors, and intelligence sources
  • Explain the security concerns associated with various types of vulnerabilities
  • Explain the techniques used in penetration testing
Topics:
  • Security Policy
  • Threat Actors
  • Social Engineering
  • Phishing & Types of Malware
  • Trojans and Spyware
  • Security Control Types
  • Defence in Depth
  • Frameworks and Compliance
  • Vulnerability Scanning and Pen Tests
  • Security Assessment Techniques
  • Pen Testing Concepts
  • Vulnerability Scanning Concepts
  • Exploitation Frameworks