Time
10 hours 32 minutes
Difficulty
Beginner
CEU/CPE
11

Video Transcription

00:46
Welcome to Cyber Very Video, Siri's and Comedy A Security Plus 5 +01 Certification and example.
00:53
I'm your Instructor, Rahm Warner.
00:56
Please visit Cyberia Diet For more information on the security plus certification and many others,
01:03
this is the introductory video for domain one on threats, attacks and vulnerabilities.
01:08
This domain is worth 21% on the security plus exam.
01:14
The first domain deals with basic need of every information security professional, being able to recognize and understand the different sources of threats, types of attacks and vulnerabilities that maybe seeing on systems. And that may be exploited.
01:29
For instance, given a scenario which will here quite often throughout security Plus,
01:34
given a scenario, candidates must be ableto to analyze indicators of compromise
01:41
IOC and determine the types of malware.
01:45
Is it a virus is a Trojan? Is it a were? Is it ransomware ready to encrypt company data and asked for Bitcoin?
01:52
Or maybe it's an insider that created a logic bomb designed to wipe out files of here. She is terminated from the company.
02:00
Or did the employees or seven malicious insider deploy a rat remote Access Trojan so here she could still have access to the corporate network. Even after termination,
02:12
you must also know how to compare and contrast types of attacks from the many different tactics of social engineering, fishing, spear, phishing, whaling, vision, tailgating and person nation.
02:23
The application serviced attacks such as Dawson DDOS, denial of service
02:29
men and middle attacks, buffer overflows, injection, cross site scripting or common Web attacks. You may also encounter privilege escalation, wireless attacks like replay evil, twin rogue access point jamming
02:44
and cryptographic attacks such as birthday, no plain text, safer tax, rainbow tables, dictionary, brute force, collision replay and weak implementations.
02:54
It is also necessary to be able to explain concepts such as threat actor types and attributes. What is the difference between organized crime and activism?
03:05
How can nation state be a threat?
03:07
Other questions include what level of sophistication should you expect from and what are the differences in motivations behind insiders and external attacks? You are also expected to know the key concepts of penetration testing, including various approaches. Black box gray box, white box
03:24
tactics, active reconnaissance, passive reconnaissance, escalation of privilege and so forth associated with pen testing. Other concepts in this domain, including explaining vulnerability scanning types of vulnerabilities, such as race conditions improper and put an error handling
03:40
untrained users. Memory, buffer overflows, architecture, design weaknesses,
03:45
new threats, euro day threats, improper certificates and key management.
03:52
There are six sections in domain one, but you see listed on your screen.
03:57
We'll have multiple videos to discuss each of these sections.
04:00
Use your study material as you're watching these videos to further learn about each of these concepts. Get as much hands on practice as you can as well. This wall help you as you study for the security plus exam and as you work to become a security professional.

Up Next

CompTIA Security+

CompTIA Security Plus certification is a great place to start learning IT or cybersecurity. Take advantage of Cybrary's free Security+ training.

Instructed By

Instructor Profile Image
Ron Woerner
CEO, President, Chief Consultant at RWX Security Solutions LLC
Instructor