Program Objectives
- Compare and contrast different types of social engineering techniques
- Given a scenario, analyze potential indicators to determine the type of attack.
- Given a scenario, analyze potential indicators associated with application attacks.
- Given a scenario, analyze potential indicators associated with network attacks.
- Explain different threat actors, vectors, and intelligence sources.
- Explain the security concerns associated with various types of vulnerabilities.
- Summarize the techniques used in security assessments.
- Explain the techniques used in penetration testing.
Course Features
- Lectures 8
- Quizzes 0
- Duration 10 weeks
- Skill level All levels
- Language English
- Students 317
- Certificate Yes
- Assessments Yes
Curriculum
- 1 Section
- 8 Lessons
- 10 Weeks
Expand all sectionsCollapse all sections
- Threats, Attacks, and Vulnerabilities8
- 1.1Compare and contrast different types of social engineering techniques11 Minutes
- 1.2Given a scenario, analyze potential indicators to determine the type of attack.83 Minutes
- 1.3Given a scenario, analyze potential indicators associated with application attacks.48 Minutes
- 1.4Given a scenario, analyze potential indicators associated with network attacks.56 Minutes
- 1.5Explain different threat actors, vectors, and intelligence sources.42 Minutes
- 1.6Explain the security concerns associated with various types of vulnerabilities.33 Minutes
- 1.7Summarize the techniques used in security assessments.29 Minutes
- 1.8Explain the techniques used in penetration testing.60 Minutes