CompTIA Security+ (SY0-701)
Last update:
11/24/2024
Completed
2.1) Types of attacks (e.g., DDoS, man-in-the-middle)
53 Views •2.2) Malware varieties (viruses, worms, trojans)
55 Views •2.3) Social engineering and phishing tactics
35 Views •2.4) Vulnerability assessments and penetration testing
42 Views •2.5) Role of threat intelligence in security
33 Views •2.2) Malware varieties (viruses, worms, trojans)
55 Views •2.1) Types of attacks (e.g., DDoS, man-in-the-middle)
53 Views •6.2) Attack frameworks (MITRE ATT&CK)
51 Views •3.3) Network segmentation techniques
50 Views •6.1) Incident response strategies
49 Views •4.4) Implementing secure protocols like SSL/TLS and IPsec
48 Views •5.1) Risk assessment and mitigation
48 Views •4.1) Basic cryptography concepts (encryption, hashing)
45 Views •6.3) Forensic techniques
45 Views •1.1) Core cybersecurity principles
44 Views •5.4) Compliance standards (PCI, GDPR, HIPAA)
43 Views •5.3) Business continuity strategies
42 Views •2.4) Vulnerability assessments and penetration testing
42 Views •1.2) Importance of confidentiality, integrity, and availability (CIA Triad)
41 Views •3.2) Virtualization and cloud security considerations
39 Views •3.1) Designing secure networks
39 Views •5.2) Incident response planning
39 Views •4.2) Symmetric vs. asymmetric encryption
37 Views •4.3) Public Key Infrastructure (PKI) fundamentals
35 Views •2.3) Social engineering and phishing tactics
35 Views •2.5) Role of threat intelligence in security
Rating
0
0
Commenting is not enabled on this course.