🌔

          • 00 - Table of Content
          • 1.4. Unified Killchain
          • 1.5. Diamond Model
          • 1.6. MITRE
          • 2.1. Intro to Cyber Threat Intel
          • 2.2. Threat Intelligence Tools
          • 2.3. Yara
          • 2.4. OpenCTI
          • Cyber Kill Chain
          • Junior Security Analyst Intro
          • Youtube - GDB Tutorial
        • OpenSecurity.info - Life of Binaries
        • OpenSecurityTraining2 - Architecture 1001: x86-64 Assembly
        • OpenSecurityTraining2 - Debuggers 1011: Introductory WinDbg
        • The 21 Mind Traps
        • TryHackMe - Linux PrivEsc
              • Analyze Attack Indicators
              • Architecture & Design
              • CompTIA Security+ (SY0-601) (old)
              • CompTIA Security+ Acronyms
              • Social Engineering Attacks
              • Threats, Attacks, Vulnerabilities
            • HTB - Bashed
            • HTB - Broker
            • HTB - CozyHosting
            • HTB - Keeper
            • HTB - Lame
            • HTB - Node
            • HTB - Sau
            • OSCP-like Machines from Hackthebox
            • UNION attacks
            • CISSP Experience Requirements
            • NASM Assembly Language Tutorials - asmtutor.com
            • BlackPill - STM32F401CCU6
            • BluePill - STM32F103C6T6
            • BluePill - STM32F103C8T6
          • CCNA Cheatsheet
          • List of ASN and IPs from Vietnam
          • List of IPs from Vietnam
          • Tryhackme Resources
      Home

      ❯

      wiki

      ❯

      CompTIA

      ❯

      sy0 601

      ❯

      Threats, Attacks, Vulnerabilities

      Threats, Attacks, Vulnerabilities

      Jul 05, 20241 min read

      • SY0-601
      • comptia
      • security

      1.1 Compare and contrast different types of social engineering techniques

      1.2 Given a scenario, analyze potential indicators to determine the type of attack

      1.3 Given a scenario, analyze potential indicators associated with application attacks

      1.4 Given a scenario, analyze potential indicators associated with network attacks

      1.5 Explain different threat actors, vectors, and intelligence sources

      1.6 Explain the security concerns associated with various types of vulnerabilities

      1.7 Summarize the techniques used in security assessments

      1.8 Explain the techniques used in penetration testing

      Search

      SearchSearch

      Graph View

      • 1.1 Compare and contrast different types of social engineering techniques
      • 1.2 Given a scenario, analyze potential indicators to determine the type of attack
      • 1.3 Given a scenario, analyze potential indicators associated with application attacks
      • 1.4 Given a scenario, analyze potential indicators associated with network attacks
      • 1.5 Explain different threat actors, vectors, and intelligence sources
      • 1.6 Explain the security concerns associated with various types of vulnerabilities
      • 1.7 Summarize the techniques used in security assessments
      • 1.8 Explain the techniques used in penetration testing

      Backlinks

      • CompTIA Security+ (SY0-601) (old)

      • GitHub