Threats, Attacks, and Vulnerabilities
Description
Program Objectives
- Compare and contrast different types of social engineering techniques
- Given a scenario, analyze potential indicators to determine the type of attack.
- Given a scenario, analyze potential indicators associated with application attacks.
- Given a scenario, analyze potential indicators associated with network attacks.
- Explain different threat actors, vectors, and intelligence sources.
- Explain the security concerns associated with various types of vulnerabilities.
- Summarize the techniques used in security assessments.
- Explain the techniques used in penetration testing.
Topics for this course
8 Lessons
Threats, Attacks, and Vulnerabilities
Program Objectives
Compare and contrast different types of social engineering techniques
Given a scenario, analyze potential indicators to determine the type of attack.
Given a scenario, analyze potential indicators associated with application attacks.
Given a scenario, analyze potential indicators associated with network attacks.
Explain different threat actors, vectors, and intelligence sources.
Explain the security concerns associated with various types of vulnerabilities.
Summarize the techniques used in security assessments.
Explain the techniques used in penetration testing.