back

CompTIA Security+ (SY0-601) (In Production)

Vendor-neutral IT Security22 H 55 M

This course has a virtual lab
This course has a practice test
Episodes
Episodes
  • Threats, Attacks, and Vulnerabilities
    • Social Engineering Techniques
    • Malware
    • Password Attacks - Types
    • Password Attacks - Tools
    • Application Attacks - Injections
    • Application Attacks - XSS and XSRF
    • Application Attacks - System Resources
    • Application Attacks - Replay Attacks
    • Network Attacks - DNS Attacks
    • Network Attacks - Layer 2 Attacks
    • Network Attacks - DoS and DDoS
    • Network Attacks - MiTM and MiTB
    • Network Attacks - Wireless
    • Vulnerabilities
    • Threat Intelligence - OSINT
    • Threat Intelligence - Threat Maps and Feeds
    • Threat Intelligence Vulnerability Databases Feed
    • Threat Actors and Vectors
  • Cryptography
    • Cryptography Concepts
    • Hashing
    • Encryption and Steganography
    • Symmetric vs. Asymmetric Encryption
    • Keys
    • Secure Protocols
    • PKI Concepts
    • IPSec
    • Certificates
  • Identity and Access Management
    • Authentication and Authorization
    • Authentication Methods
    • Additional Authentication Methods
    • Biometrics
    • Authentication Protocols - PAP and CHAP
    • Authentication Protocols - EAP and 802.1X
    • Authentication Protocols - RADIUS and TACACS
    • Authentication Protocols - Kerberos
    • Access Control Schemes
    • Account Management - Account Types
    • Account Management - Password Policies
    • Account Management - Account Policies
  • Implementing Security
    • Application Security
    • Physical Security
    • Wireless Security
    • Secure Data Destruction
    • Host Security - Endpoint Protection
    • Host Security - Hardening
    • Mobile Device Deployment
    • Mobile Device Management and Enforcement
    • Mobile Device Connections
    • Specialized Systems
    • Network Security - Segmentation
    • Network Security - VPNs
    • Network Security - Port Security
    • Network Security - Firewalls
    • Network Security - NIDS and NIPS
  • Cloud and Virtualization
    • Virtualization
    • Cloud Concepts
    • Cloud Services
    • Cloud Models
    • Computing Types
    • Cloud Security Controls
  • Operational Resiliency
    • Hardware Redundancy
    • Site Redundancy
    • Non-persistence Concepts
    • Backup and Recovery
  • Operational Security and Incident Response
    • Network Reconnaissance and Discovery
    • Packet Capture and Replay
    • Vulnerability Scans
    • SIEM and SOAR Systems
    • Pentesting Techniques
    • Pentesting Exercise Types
    • Digital Forensics Concepts
    • Investigational Data Sources
    • Incident Response Process
    • Incident Response Plans
    • Attack Frameworks

Social Engineering Techniques

20 M

itprotv course thumbnailitprotv course thumbnailitprotv course thumbnail
  • Episode Description

In this episode, we discuss the methods used by bad actors to deceptively manipulate individuals into divulging confidential information through social engineering. We will compare and contrast different types of social engineering techniques like phishing, whaling, spam, spear phishing and more.

Just you? Training a whole team? There's an ITProTV plan that fits.

With more than 5,800 hours of engaging video training for IT professionals, you'll find the courses you and your team need to stay current and get the latest certifications.

This website uses cookies to enhance the user experience. By using this site and service, you agree to the use of cookies as described in the ITProTV Privacy Policy.