In this video, learn about threat actor activities used in today's attacks.
- [Instructor] In the world of cybersecurity,…we refer to the attacker as a threat actor.…Threat actors can be part…of an organized criminal hacking group,…an advanced persistent threat or nation state hacker,…a script kiddie hacking from his mom's basement,…your own employee, when dealing with an insider threat,…or even a terrorist group.…Threat actors can really be anyone…who wishes to cause harm to your network.…Now, in the media,…you'll usually hear the terms hacker and cracker…being used interchangeably,…but in recent years,…the term hacker has really become prevalent,…and it usually conjures up these visions…of someone behind a laptop in a black hooded sweatshirt.…
But originally,…the term hacker was simply a computer enthusiast,…and they weren't criminals.…Crackers were hackers with malicious intent.…They were the criminals.…But due to the media coverage in the 1990s and early 2000s,…the terms got really blended together,…where hackers became known…as that evil threat actor among us.…In the information security world, though,…
Looking for study partners?Join the CASP+ Exam study group
To effectively fight off malware and cyberattacks on an enterprise network, IT security professionals must understand how to collaborate with colleagues across their organization and research new and emerging threats. In this installment of the CASP+ Cert Prep series, instructor Jason Dion equips you with research methods and collaboration techniques that can help you implement secure designs in your business, as well as prepare for domain 5 of the CASP+ exam: Research, Development, and Collaboration. Learn methods for researching industry trends that could impact your network, review key security activities across both the systems and software development lifecycles, and discover how to collaborate with stakeholders in a range of different roles, from database administrators to HR teams.
We are a CompTIA Content Publishing Partner. As such, we are able to offer CompTIA exam vouchers at a 10% discount. For more information on how to obtain this discount, please download these PDF instructions.
- Best practices for conducting research
- Current threats and threat models
- Emerging social media platforms and their threats
- Integrating research into business functions
- Security activities across the systems and software development lifecycles
- Adapting solutions to meet business needs
- Collaborating with programmers, sales staff, facilities managers, and others
- Providing guidance to senior management
Skill Level Advanced
1. Research Methods
2 Security Activities across the Life Cycle
3. Collaboration with Other Business Units
What to do next2m 49s
- Mark as unwatched
- Mark all as unwatched
Are you sure you want to mark all the videos in this course as unwatched?
This will not affect your course history, your reports, or your certificates of completion for this course.Cancel
Take notes with your new membership!
Type in the entry box, then click Enter to save your note.
1:30Press on any video thumbnail to jump immediately to the timecode shown.
Notes are saved with you account but can also be exported as plain text, MS Word, PDF, Google Doc, or Evernote.