Autoplay
Autocomplete
Previous Lesson
Complete and Continue
CompTIA Security+ (SY0-601)
1. Basic Security Concepts
1. What is Security (2:23)
2. Privacy-Integrity-Availability (3:15)
3. Encryption and Access Control (2:54)
4. 3 A Rule (Authentication, Authorization and Accounting) (3:53)
5. Threat (3:45)
6. What is a Hacker (6:27)
7. What is Attack What are the Stages (3:19)
8. Single Point Of Failure (SPOF) (3:14)
9. Introducing Basic Risk Concepts (3:22)
2. Identity Management
1. What is Identity Management (2:15)
2. KERBEROS & NTLM&LDAP (7:32)
3. Single Sign-On (11:02)
4. Smart Cards (2:58)
5. Tokens or Key Fobs (5:20)
6. Biometric Methods (7:36)
7. Dual-Factor and Multifactor Authentication (1:38)
8. PAP CHAP MS-CHAP (2:46)
9. RADIUS (6:26)
3. Summary-1
1. Summary-1 (3:26)
4. Users
1. Create a User In Comptia (3:03)
2. Managing Accounts-1 (11:44)
3. Managing Accounts-2 (9:21)
4. Passwords (9:18)
5. Password Policy (9:02)
5. Comparing Access Control Models
1. Comparing Access Control Models (2:19)
2. Role-Based Access Control (3:15)
3. Establishing Access with Group-Based Privileges (4:42)
4. Rule Based and Discretionary Access Control (5:39)
5. Mandatory Access Control (2:46)
6. Establishing Access Attribute-Based Access Control (6:07)
6. Virtualization
1. What is Virtualization (3:46)
10. Configuring NAT Network in Oracle VM VirtualBox (1:07)
2. Virtualization Technologies (2:55)
3. Benefits of Virtualization (5:00)
4. Security Issues of Virtualization (3:50)
5. Create Lab Download and Install VirtualBox (5:02)
6. Install Virtual Kali Linux-1 (1:43)
7. Install Virtual Kali Linux-2 (6:46)
8. Install Virtual Kali Linux-3 (5:24)
9. OWASP Broken Web Applications (4:30)
7. Network Technologies
1. Basic Network Concepts (15:38)
2. Domain Name Services(DNS) (9:47)
3. What is the port How does it work (5:10)
4. What is the Network Address (7:05)
5. Combining the IP Address and the Port (4:37)
6. Switches (5:03)
7. Bridge (3:07)
8. Routers (9:29)
9. Understanding NAT and PAT (2:37)
10. Network Separation (3:16)
11. Proxy Servers (7:13)
12. Types of Using Network Technologies-1 (9:14)
13. Types of Using Network Technologies-2 (8:26)
8. Wireless Networks
1. Reviewing Basic Wireless Network Information (6:29)
2. Wireless Cryptographic Protocols (7:38)
3. Authentication Protocols for Wireless Networks (6:24)
9. Summary-2
1. Summary-2 (3:02)
10. Network Security Technologies
1. Firewalls (9:28)
2. Network Access Control (9:27)
3. Implementing a Secure Network (5:15)
11. Intrusion Detection Systems
1. Understanding IDSs and IPSs (4:46)
2. Detection Methods (11:49)
3. Honeypots (4:42)
12. Virtual Private Network(VPN) Technologies
1. Using VPNs for Remote Access (3:54)
2. VPN Tunnel Protocols (6:18)
3. Site-to-Site VPNs (2:36)
13. Security Threats
1. Understanding Threat Actors (12:36)
2. Viruses (2:10)
3. Logic Bombs (3:21)
4. Trojans (5:31)
5. Ransomware (3:24)
6. Spyware (3:03)
7. Bots and Botnets (4:17)
8. Unified Threat Management(UTM) (5:55)
14. Securing Wireless Networks
1. Disable SSID Broadcasting or Not (1:27)
2. Enable MAC Filtering (1:53)
15. Understanding Wireless Attacks
1. Disassociation Attacks (1:58)
2. WPS and WPS Attacks (1:50)
3. Rogue AP (2:14)
4. Evil Twin (2:08)
5. Jamming Attacks (3:47)
6. Bluetooth Attacks (2:51)
7. RFID Attacks (2:40)
8. Wireless Replay Attacks (1:49)
9. Rogue Access Points-Airbase-ng (5:46)
10. Rogue Access Points-Evil-Twin-Attack (6:42)
11. Cracking-WEP-Preparing-Attacks (2:49)
12. Cracking-WEP-Fake-Authentication-Attack (3:50)
13. Cracking-WEP-ChopChop-Attack (3:47)
14. Cracking-WPA-Aircrack-ng (3:57)
15. Cracking-WPA-John-the-Ripper (4:09)
17. Network Attacks
1. Network Attacks (3:39)
2. SYN Flood Attack (2:55)
3. MAC Flood Attacks (2:53)
4. MAC Flood Using Macof (7:09)
5. Man-in-the-Middle Attacks (1:33)
6. ARP Poisoning Attacks (3:49)
7. DNS Attacks (6:17)
18. Password Attacks
1. Brute Force&Dictionary Attacks (3:32)
2. Cain & Abel_ A Brute Force Attack (8:59)
3. Cain & Abel_ A Dictionary Attack (3:36)
4. Password Hashes (4:54)
5. Cain and Abel_ Gathering Hashes (4:43)
6. Birthday Attacks (4:50)
7. Replay Attacks (3:25)
8. Hijacking and Related Attacks (5:59)
9. Driver Manipulation (2:07)
19. Zero-Day Attacks
1. Zero-Day Attacks (4:19)
20. Code Attacks
1. Code Reuse and SDKs (4:31)
2. Code Quality and Testing (2:51)
3. Development Life-Cycle Models (3:42)
4. Secure DevOps (3:19)
5. Version Control and Change Management (2:17)
6. Provisioning and Deprovisioning (1:48)
21. Web Server Attacks
1. Web Servers (2:07)
2. SQL Injection Attacks (4:32)
3. Protecting Against SQL Injection Attacks (2:38)
4. SQL Injection - Part I (4:20)
5. SQL Injection - Part II (4:41)
6. SQL Injection - Part III (5:20)
7. DLL Injection (2:25)
8. Cross-Site Scripting (6:40)
9. Classification of Web Attacks (1:37)
10. Zed Attack Proxy (ZAP)_ A Web App Vulnerability Scanner (3:06)
11. XSS (Cross Site Scripting) - Stored and DOM Based XSS (7:01)
12. Cross Site Request Forgery (CSRF) (5:12)
13. Path Traversal_ File (5:41)
22. Social Engineering Attacks
1. Social Engineering (4:09)
2. Shoulder Surfing (1:06)
3. Tricking Users with Hoaxes (1:18)
4. Tailgating and Mantraps (1:12)
5. Dumpster Diving (1:26)
6. Watering Hole Attacks (1:06)
7. Spam (2:04)
8. Phishing (6:24)
9. Whaling (2:45)
10. Vishing (3:08)
11. Beware of Email from Friends (2:00)
12. Why Social Engineering Works (9:31)
13. Social Engineering Toolkit (SET) for Phishing (6:34)
23. Summary-4
1. Summary-4 (3:32)
24. Memory Buffer Vulnerabilities
1. Memory Leak (2:42)
2. Buffer Overflow Attacks (4:16)
3. Pointer Dereference (2:07)
4. Compiled Versus Runtime Code (1:20)
5. Proper Input Validation (4:07)
6. Side Input Validation (3:20)
7. Avoiding Race Conditions (2:13)
8. Proper Error Handling (2:14)
9. Cryptographic Techniques (1:43)
25. Preventing Attacks
1. Protecting Systems from Malware (2:05)
2. Antivirus and Anti-Malware Software (8:22)
3. Advanced Malware Tools (3:31)
4. Educating Users (1:53)
5. Implementing Defense in Depth (3:35)
26. Server Security
1. Implementing Secure Systems (4:11)
2. Operating systems (4:12)
3. Secure Operating System Configurations (6:33)
4. Resiliency and Automation Strategies (4:56)
5. Change Management Policy (7:09)
6. Secure Staging and Deployment (5:26)
7. Peripherals (4:10)
8. EMI and EMP (7:46)
9. Hardware Security Module (2:26)
10. Cloud Deployment Models (5:29)
11. Cloud Services (6:20)
12. Security Responsibilities with Cloud Models (1:52)
27. Mobile Devices
1. Deploying Mobile Devices Securely (2:14)
2. Deployment Models (8:35)
3. Mobile Device Management (9:26)
4. Unauthorized Software (5:03)
5. Hardware Control (2:42)
6. Unauthorized Connections (2:32)
28. Exploring Embedded Systems
1. Exploring Embedded Systems (7:06)
2. Understanding Stuxnet (2:13)
3. Real-Time Operating Systems (3:16)
29. Summary-5
1. Summary-5 (4:14)
30. Data Security
1. Protecting Data (11:24)
2. Data Loss Prevention (5:31)
31. Database Security
1. Database Concepts (2:48)
2. Normalization (5:26)
3. SQL Queries (1:56)
4. Database Security (0:58)
32. Risk Management
1. Understanding Risk Management (2:40)
2. Risk Management (2:46)
3. Threats and Threat Assessments (4:22)
4. Vulnerabilities (2:03)
5. Risk Assessment (13:06)
6. Risk Registers (5:51)
33. Checking for Vulnerabilities
1. Checking for Vulnerabilities (1:52)
2. Password Crackers (1:59)
3. Password Cracking Tools (0:08)
4. Hydra_ Cracking the Password of a Web App (10:01)
5. Password Cracking with Cain & Aibel (1:01)
6. Network Scan Types (2:50)
7. Passive Scan with Wireshark (6:36)
8. Passive Scan with ARP Tables (6:20)
9. What is NMAP (4:14)
10. Nmap with Ping Scan (4:59)
11. Nmap with TCP Scan (7:11)
12. Nmap with Version Detection (5:58)
13. Nmap with Operating System Detection (7:10)
14. Active Scan with Hping (8:30)
15. Wireless Scanners Cracker (3:18)
16. Banner Grabbing (0:47)
17. Vulnerability Scanning (11:23)
18. Introduction to Vulnerability Scan (9:19)
19. Introduction to Nessus (1:57)
20. Nessus_ First Scan (7:07)
34. Penetration Tests
1. Penetration Tests (2:45)
2. Passive & Active Reconnaissance (2:02)
3. Initial Exploitation (3:45)
4. White, Gray and Black Box Testing (3:00)
5. Intrusive and Non-Intrusive Testing (1:22)
6. Passive Versus Active Tools (11:42)
35. Physical Security Precautions
1. Comparing Physical Security Controls (3:28)
2. Comparing Door Lock Types (5:33)
3. Preventing Tailgating with Mantraps (2:00)
4. Increasing Physical Security with Guards (8:21)
5. Using Hardware Locks (2:56)
6. Asset Management (2:33)
7. Implementing Environmental Controls (14:02)
36. Summary-6
1. Summary-6 (1:59)
37. Single Point of Failure
1. Single Point of Failure (1:47)
2. Disk Redundancies (4:25)
3. Server Redundancy and High Availability (9:12)
4. Backup (15:18)
38. Business Continuity Plans
1. Comparing Business Continuity Elements (6:09)
2. Impact (3:54)
3. Recovery Time Objective (4:55)
4. Recovery Sites (5:53)
5. Disaster Recovery (8:11)
39. Examination of Logs
1. Monitoring Logs for Event Anomalies (8:43)
2. Other Logs-SIEM (7:12)
3. Continuous Monitoring (6:08)
40. Controls
1. Understanding Control Types (7:12)
2. Control Goals (10:53)
41. Cryptography and PKI
1. Introducing Cryptography Concepts (3:08)
2. Hashing (4:43)
3. MD5 (0:54)
4. SHA (2:55)
5. HMAC (2:49)
6. Hashing Files (2:56)
7. Digital Signatures, Certificates and non-repudiation (2:52)
8. Hashing Messages (4:35)
9. Providing Confidentiality with Encryption (8:16)
10. Block Versus Stream Ciphers (4:09)
11. Symmetric Encryption (1:55)
12. Symmetric Encryption Methods (6:19)
13. Asymmetric Encryption (1:56)
14. Certificates (3:58)
15. Steganography And Obfuscation (2:40)
16. Using Cryptographic Protocols (1:49)
17. Cipher Suites (3:38)
18. Exploring PKI Components (8:04)
19. Recovery Agent (1:08)
20. Comparing Certificate Types (4:37)
21. Certificate Formats (3:10)
42. Protecting Email
1. Protecting Email (1:51)
2. Encrypting Email (3:40)
43. Secure Web Page
1. HTTPS Transport Encryption (5:09)
44. Risk Mitigation Methods
1. Exploring Security Policies (1:14)
10. Troubleshooting Personnel Issues (2:28)
2. Personnel Management Policies (10:41)
3. Background Check (2:50)
4. NDA (4:40)
5. Policy Violations and Adverse Actions (1:37)
6. Agreement Types (3:02)
7. PII and PHI (5:14)
8. Responding to Incidents (2:33)
9. Providing Training (5:32)
45. Summary-7
1. Summary-7 (1:41)
46. Conclusion
1. Conclusion (11:23)
Teach online with
6. What is a Hacker
Lesson content locked
If you're already enrolled,
you'll need to login
.
Enroll in Course to Unlock