JavaScript Required
We’re sorry, but Coda doesn’t work properly without JavaScript enabled.
Skip to content
Security+
1.0 Threats, Attacks, and Vulnerabilities.
2.0 Architecture and Design
3.0 Implementation
4.0 Operations and Incident Response
5.0 Governance, Risk, and Compliance
Practice Tests
More
Share
Explore
1.0 Threats, Attacks, and Vulnerabilities.
1.0 Threats, Attacks, and Vulnerabilities.
1.1 Compare and Contrast different types of social engineering techniques.
1.2 Given a scenario, analyze potential indicators to determine the type of attack.
1.3 Given a scenario, analyze potential indicators associated with application attacks.
1.4 Given a scenario, analyze potential indicators associated with network attacks.
1.5 Explain different threat actors, vectors, and intelligence sources
1.6 Explain the security concerns associated with various types of vulnerabilities.
1.7 Summarize the techniques used in security assessments
1.8 Explain the techniques used in Penetration Testing
Want to print your doc?
This is not the way.
Try clicking the ⋯ next to your doc name or using a keyboard shortcut (
Ctrl
P
) instead.