Autoplay
Autocomplete
Previous Lesson
Complete and Continue
CompTIA Security+ SY0-601 - Complete Certification Training Course
1.RISK MANAGEMENT
1. Introduction to the CompTIA Security+ Exam SY0-501 (3:21)
2.The CIA of Security (3:45)
3.Threat Actors (6:39)
4.What is Risk (9:53)
5.Managing Risk (11:56)
6.Using Guides for Risk Assessment (6:23)
7.Security Controls (7:23)
8.Interesting Security Controls (3:15)
9.Defense in Depth (4:56)
10.IT Security Governance (8:18)
11.Security Policies (8:17)
12.Frameworks (8:21)
13.Quantitative Risk Calculations (8:11)
14.Business Impact Analysis (11:58)
15.Organizing Data (9:59)
16.Security Training (10:01)
17.Third Party Agreements (8:42)
2.CRYPTOGRAPHY
1.Cryptography Basics (17:11)
2.Cryptographic Methods (7:24)
3.Symmetric Cryptosystems (11:44)
4.Symmetric Block Modes (7:46)
5.RSA Cryptosystems (10:18)
6.Diffie-Hellman (6:42)
7.PGP-GPG (9:45)
8.Hashing (7:15)
9.HMAC (3:46)
10.Steganography (5:38)
11.Certificates and Trust (14:15)
12.Public Key Infrastructure (20:48)
13.Cryptographic Attacks (24:13)
3.IDENTITY AND ACCESS MANAGEMENT
1.Identification (12:42)
2.Authorization Concepts (5:48)
3.Access Control List (6:28)
4.Password Security (9:13)
5.Linux File Permission (14:52)
6.Windows File Permissions (13:38)
7.User Account Management (6:43)
8.AAA (8:03)
9.Authentication Methods (9:50)
10.Single Sign-On (10:09)
4.TOOLS OF TRADE
1.OS Utilities-Part 1 (14:46)
2.OS Utilities, Part 2 (14:04)
3.Network Scanners (10:47)
4.Protocol Analyzers (10:51)
5.SNMP (15:22)
6.Logs (11:10)
5.SECURING INDIVIDUAL SYSTEMS
1.Denial of Service (8:33)
2.Host Threats (9:01)
3.Man in the Middle Attack (22:07)
4.RFI, EMI and ESD (3:12)
5.Data and System Security (4:21)
6.Disk Encryption (6:42)
7.HardwareFirmware Security (9:11)
8.Secure OS Types (7:43)
9.Analyzing Output (14:54)
10.IDS and IPS (4:28)
11.Automation Strategies (4:57)
12.Data Destruction (4:52)
6.THE BASIC LAN
1.LAN Review (8:00)
2.Network Topologies Review (5:03)
3.Network Zone Review (10:26)
4.Network Access Controls (10:31)
5.The Network Firewall (13:05)
6.Honeypots (4:32)
7.Virtual Private Networks (13:46)
8.NIDS_NIPS (6:00)
7.BEYOND THE BASIC LAN
1.Wireless Review (9:43)
2.Living in Open Networks (9:41)
3.Vulnerabilities with Wireless Access Points (7:01)
4.Cracking 802.11 – WEP (11:58)
5.Cracking 802.11 – WPA (9:23)
6.Cracking 802.11 – WPS (9:47)
7.Wireless Hardening (14:03)
8.Wireless Access Points (13:13)
9. Virtualization Basics (7:15)
10. Virtual Security (15:05)
11.Containers (10:46)
12.IaaS (9:32)
13.PaaS (9:03)
14.SaaS (2:39)
15.Deployment Models (8:41)
16.Static Hosts (7:30)
17.Mobile Connectivity (12:03)
18.Deploying Mobile Devices (5:24)
19.Mobile Enforcement (12:32)
20.Mobile Device Management (10:24)
21.Physical Controls (8:44)
22.HVAC (7:25)
23.Fire Suppression (4:02)
8.SECURE PROTOCOLS
1.Secure Applications and Protocol (10:55)
2.Network Models (6:45)
3. Know Your Protocols - TCPIP (6:07)
4.Know Your Protocols - Application (5:42)
5.Transport Layer Security (12:04)
6.Internet Service Hardening (6:43)
7.Protecting Your Servers (6:12)
8.Secure Code Development (10:17)
9.Secure Deployment Concepts (12:04)
10.Code Quality and Testing (5:00)
9.TESTING YOUR INFRASTRUCTURE
1.Vulnerability Scanning Tools (9:22)
2.Vulnerability Scanning Assessment (4:43)
3.Social Engineering Principles (2:14)
4.Social Engineering Attacks (7:54)
5.Attacking Web Sites (7:53)
6.Attacking Applications (10:56)
7. Exploiting a Target (11:17)
8. Vulnerability Impact (10:48)
10.DEALING WITH INCIDENTS
2.Digital Forensics (11:35)
1. Incident Response (6:34)
3.Contingency Planning (10:10)
4.Backups (7:43)
Teach online with
6.Using Guides for Risk Assessment
Lesson content locked
If you're already enrolled,
you'll need to login
.
Enroll in Course to Unlock