Week 3  38  pages and 30 multiple choice questions
Read Chapters 4, 5, and 6 again
Chapter 7 – Explain various types of vulnerabilities – 15 pages

Chapter 8 – Given a scenario, analzye indicators of malicous activity – 22 pages

Chapter 9 – Explain the purpose of mitigation techniques used to secure the enterprise – 11 pages

 

Action – Ian’s Book Key Elements
Chapter 7 – Read pages 85-99 taking notes
Complete all 10 review questions pages 100-102
Any review questions that are wrong or missing then go back into the chapter and read those areas

Chapter 8 – Read pages 104 -125 taking notes – 22 pages

Complete all 10 review questions pages 126-128

Any review questions that are wrong or missing then go back into the chapter and read those areas

Chapter 9 – Read pages 129 -139 taking notes

Complete all 10 review questions pages 140-142

Any review questions that are wrong or missing then go back into the chapter and read those areas

Videos – Professor Messer
https://www.professormesser.com/security-plus/sy0-701/sy0-701-video/sy0-701-comptia-security-plus-course/

2.3 Types of vulnerability

  • Buffer overflows
  • Race condition
  • Malicious updates
  • SQL injection
  • Cross-site scripting
  • Hardware vulnerabilities
  • Supply chain vulnerabilities
  • Mobile device vulnerabilities

 

Action – Lab Exercises (optional) 101 Labs – click Security+
Conducting s cross-site scripting attack

Introduction to scripting using powershell

Using netstat command to view networking information

Nmap

 

CompTIA Security+ – 101Labs.net

  • then click on Security+

Ian’s Website
Lab 6 – Emulating Group Policy
Labs | Ian Neil’s Security+ Study Materials (securityplus.training)

Application vulnerabilities

Operating system – based attacks

Web-based attacks

Hardware attacks

Virtualization

Cloud specific attacks

Supply chain attacks

Cryptographic attacks

Mobile device attacks

Zero-day attacks

Malware attacks

Physical attacks

Network attacks

Application attacks

Password attacks

Attack Indicators

Segmentation/Isolation

Access Control

Application Allow list

Patching

Monitoring

Least privilege

Configuration enforcement

Decommissioning

Hardening Techniques