Tags
Language
Tags
December 2024
Su Mo Tu We Th Fr Sa
1 2 3 4 5 6 7
8 9 10 11 12 13 14
15 16 17 18 19 20 21
22 23 24 25 26 27 28
29 30 31 1 2 3 4

Comptia Security+ (Exam Sy0-601)

Posted By: ELK1nG
Comptia Security+ (Exam Sy0-601)

Comptia Security+ (Exam Sy0-601)
Last updated 4/2022
MP4 | Video: h264, 1280x720 | Audio: AAC, 44.1 KHz
Language: English | Size: 2.42 GB | Duration: 10h 48m

CompTIA Security+ (Exam SY0-601)

What you'll learn
Understand threats, attacks, and vulnerabilities
Analyze attacks
Learn about enterprise security architecture
Design authentication and authorization
Understand cloud and virtualization concepts
Secure application development and deployment
Implement physical security controls
Secure embedded and specialized systems
Learn about cryptographic concepts
Implement public key infrastructures
Implement secure networks
Implement secure mobile solutions
Implement secure hosts and identities
Use tools to assess security
Utilize data sources for investigation
Apply mitigation techniques
Learn about incident response and forensics
Understand governance, risk, and compliance
Requirements
The course starts with the basics of information and network security. Hence, no prior knowledge of information security is required. However, the candidates are expected to have a fair knowledge of basic networking and computing concepts such as system administration, network administration, TCP/IP, routing, switching etc.
In addition to this, the candidates are also recommended to have studied the CompTIA A+ certification course or possess the equivalent knowledge.
Description
Information and network security has become an important topic of discussion in recent times and the focus of almost every organization on information and network security is increasing with each passing day. This is primarily due to increased reliance on digital systems for day-to-day operations. There is a substantial amount of data residing on the digital systems that lures hackers and state actors towards illegally accessing and using it for monetary benefits and other political reasons.This course prepares the candidates to appear in the CompTIA Security+ (SY0-601) exam. The CompTIA Security+ exam is a foundational exam for aspiring information security professionals and enables them to understand different threats, analyze attacks, learn cryptography, implement secure networks, devise operational procedures, perform forensic analysis and more to ensure integrity and protection of sensitive data.This course also provides the basis to build on the knowledge gained and advance towards other professional certifications in the field of information and network security. This can be a great career move for young IT professionals to explore the in-demand network and information security arena. The CompTIA Security+ is the premier vendor-neutral security certification. This preparatory course for the CompTIA Security+ certification exam assures that the students completely learn and understand the exam topics of the latest SY0-601 exam version. The students will be able to demonstrate their knowledge of security concepts, tools, and procedures. It also confirms their ability to react to security incidents, and validates their skills in anticipating security risks and guarding against them. Overall, the course is very well designed to give a detailed overview of network and information security concepts and practical implications to the students. This helps them to appear in the CompTIA Security+ exam as well as polish their skills to improve their productivity in their jobs.

Overview

Section 1: Course Introduction

Lecture 1 Instructor Introduction

Lecture 2 Course Introduction

Section 2: Chapter 1 - Understanding Threats, Attacks, and Vulnerabilities

Lecture 3 Understanding Threats, Attacks, and Vulnerabilities

Lecture 4 Topic A: Introduction to Security Concepts

Lecture 5 Security Fundamentals

Lecture 6 Security Terms

Lecture 7 Topic B: Identifying Threat Actors and Vectors

Lecture 8 Actors and Threats

Lecture 9 Hackers

Lecture 10 Actor Attributes

Lecture 11 Attack Vectors

Lecture 12 Information Gathering

Lecture 13 Intelligence Sources

Lecture 14 Research Sources

Lecture 15 Demo - Research Sources

Lecture 16 Topic C: Understanding Vulnerabilities

Lecture 17 Vulnerability Fundamentals

Lecture 18 Security Impacts

Lecture 19 Vulnerability Types

Lecture 20 Vulnerability Types (cont.)

Lecture 21 Topic D: Understanding Attack Types

Lecture 22 Attack Types

Lecture 23 Understanding Malware Types

Lecture 24 Attacking Passwords and User Credentials

Lecture 25 Physical Attacks

Lecture 26 Other Attack Types

Lecture 27 Topic E: Identifying Social Engineering Techniques

Lecture 28 Social Engineering Principles

Lecture 29 Phishing

Lecture 30 Other Social Engineering Types

Lecture 31 Other Social Engineering Types (cont.)

Lecture 32 Chapter 1 Review

Section 3: Chapter 2 - Analyzing Attacks

Lecture 33 Analyzing Attacks

Lecture 34 Topic A: Security Assessment Tools and Techniques

Lecture 35 Understanding Assessments

Lecture 36 Threat Hunting

Lecture 37 Vulnerability Scanning

Lecture 38 Syslog and SIEM

Lecture 39 SIEM Components

Lecture 40 Topic B: Application Attacks

Lecture 41 Application Attacks

Lecture 42 Privilege Escalation

Lecture 43 Cross-Site Scripting

Lecture 44 Injections

Lecture 45 Application Attack Issues

Lecture 46 Session Attacks

Lecture 47 Additional Attacks

Lecture 48 Topic C: Network Attacks

Lecture 49 Introduction to Network Attacks

Lecture 50 Wireless Network Attacks

Lecture 51 Layer 2 Attacks

Lecture 52 Service Attacks

Lecture 53 Demo - DNS Poisoning

Lecture 54 Malicious Code

Lecture 55 Topic D: Penetration Testing

Lecture 56 Penetration Testing

Lecture 57 Environment Types

Lecture 58 Pentesting Concepts

Lecture 59 Network Reconnaissance

Lecture 60 Exercise Types

Lecture 61 Chapter 2 Review

Section 4: Chapter 3 - Architecture and Design

Lecture 62 Architecture and Design

Lecture 63 Topic A: Enterprise Security Architecture

Lecture 64 Enterprise Standardization Needs

Lecture 65 Configuration Management

Lecture 66 Data Protection

Lecture 67 Additional Security Concepts

Lecture 68 Disaster Recovery

Lecture 69 Deception and Disruption

Lecture 70 Topic B: Designing Authentication and Authorization

Lecture 71 Authentication and Authorization

Lecture 72 Authentication Methods

Lecture 73 Authentication Technologies

Lecture 74 Biometrics

Lecture 75 Multifactor Authentication

Lecture 76 Demo - Multifactor Authentication

Lecture 77 Topic C: Designing Resiliency

Lecture 78 Resiliency and Cybersecurity

Lecture 79 Redundancy Concepts

Lecture 80 Replication Concepts

Lecture 81 Backup Concepts

Lecture 82 Additional Resiliency Options

Lecture 83 Topic D: Cloud and Virtualization Concepts

Lecture 84 Cloud Models

Lecture 85 Cloud Types

Lecture 86 Cloud Service Providers

Lecture 87 Additional Cloud Concepts

Lecture 88 Additional Cloud Concepts (cont.)

Lecture 89 Demo - Cloud Computing Security

Lecture 90 Topic E: Securing Application Development and Deployment

Lecture 91 Application Development Environments

Lecture 92 Secure Coding Techniques

Lecture 93 Automation Techniques

Lecture 94 Application Design Concepts

Lecture 95 Chapter 3 Review

Section 5: Chapter 4 - Physical and System Security

Lecture 96 Physical and System Security

Lecture 97 Topic A: Physical Security Controls

Lecture 98 Importance of Physical Controls

Lecture 99 Standard Controls

Lecture 100 Security Monitoring

Lecture 101 Security Personnel

Lecture 102 Secure Areas

Lecture 103 Secure Data Destruction

Lecture 104 Demo - Data Destruction Software

Lecture 105 Topic B: Securing Embedded and Specialized Systems

Lecture 106 Embedded Systems

Lecture 107 Specialized Systems

Lecture 108 Additional System Types

Lecture 109 Communication Considerations

Lecture 110 Constraints

Lecture 111 Chapter 4 Review

Section 6: Chapter 5 - Cryptography

Lecture 112 Cryptography

Lecture 113 Topic A: Cryptographic Concepts

Lecture 114 Introduction to Cryptography

Lecture 115 Common Use Cases

Lecture 116 Integrity Verification

Lecture 117 Understanding Keys

Lecture 118 Crypto Limitations

Lecture 119 Quantum

Lecture 120 Additional Cryptographic Types

Lecture 121 Topic B: Public Key Infrastructures

Lecture 122 Introduction to PKIs

Lecture 123 Certificate Authorities

Lecture 124 Certificates

Lecture 125 Certificate Verification

Lecture 126 Certificate Formats

Lecture 127 Demo - Implementing PKI

Lecture 128 Additional Concepts

Lecture 129 Chapter 5 Review

Section 7: Chapter 6 - Implementing Secure Networks

Lecture 130 Implementing Secure Networks

Lecture 131 Topic A: Implement Secure Protocols

Lecture 132 Network Protocols

Lecture 133 Use Cases

Lecture 134 Application Layer Protocols

Lecture 135 IP Security

Lecture 136 Topic B: Implement Secure Network Designs

Lecture 137 Network Segmentation

Lecture 138 High Availability

Lecture 139 Virtual Private Networks

Lecture 140 Secure Network Appliances

Lecture 141 Firewalls

Lecture 142 Demo - Configuring a Host-Based Firewall

Lecture 143 Additional Network Security Concepts

Lecture 144 Topic C: Implementing Security in the Cloud

Lecture 145 Cloud Security Controls

Lecture 146 Cloud Storage Security

Lecture 147 Cloud Network Security

Lecture 148 Compute Security

Lecture 149 Additional Cloud Solutions

Lecture 150 Topic D: Implement Wireless Security

Lecture 151 Cryptographic Protocols

Lecture 152 Authentication Protocols

Lecture 153 Authentication Methods

Lecture 154 Installation Considerations

Lecture 155 Topic E: Implement Secure Mobile Solutions

Lecture 156 Deployment Models

Lecture 157 Connection Methods and Receivers

Lecture 158 Mobile Device Management (MDM)

Lecture 159 Mobile Devices

Lecture 160 Enforcement and Monitoring

Lecture 161 Additional Controls

Lecture 162 Chapter 6 Review

Section 8: Chapter 7 - Implementing Secure Hosts and Identities

Lecture 163 Implementing Secure Hosts and Identities

Lecture 164 Topic A: Implement Authentication and Authorization Systems

Lecture 165 Understanding Identity

Lecture 166 Access Control Methods

Lecture 167 Demo - Role-Based Access Control

Lecture 168 Authentication Management

Lecture 169 Remote Access Authentication

Lecture 170 Authentication and Authorization Protocols

Lecture 171 Topic B: Implement Identity and Account Management Controls

Lecture 172 Account Types

Lecture 173 Account Policies

Lecture 174 Demo - Configuring Account Policies

Lecture 175 Additional Identity Terms

Lecture 176 Topic C: Implement Host and Application Security Solutions

Lecture 177 Endpoint Protection

Lecture 178 Client Level Protections

Lecture 179 Network Level Protections

Lecture 180 Boot Integrity

Lecture 181 Database Security

Lecture 182 System Hardening

Lecture 183 Application Security

Lecture 184 Chapter 7 Review

Section 9: Chapter 8 - Operational Procedures

Lecture 185 Operational Procedures

Lecture 186 Topic A: Using Tools to Assess Security

Lecture 187 Network Reconnaissance and Discovery

Lecture 188 Network Tools

Lecture 189 Network Tools (cont.)

Lecture 190 Demo - Using Network Tools

Lecture 191 File Manipulation Tools

Lecture 192 Packet Capture and Relay

Lecture 193 Shell and Script Environments

Lecture 194 Forensics Tools

Lecture 195 Topic B: Utilizing Data Sources for Investigation

Lecture 196 Vulnerability Scan Output

Lecture 197 SIEM Dashboards

Lecture 198 Log Files

Lecture 199 Additional Monitoring

Lecture 200 Topic C: Applying Mitigation Techniques

Lecture 201 Reconfiguring Endpoint Solutions

Lecture 202 Configuration Changes

Lecture 203 Additional Mitigation Techniques

Lecture 204 Chapter 8 Review

Section 10: Chapter 9 - Incident Response and Forensics

Lecture 205 Incident Response and Forensics

Lecture 206 Topic A: Incident Response Policies and Procedures

Lecture 207 Incident Response Plans

Lecture 208 Incident Response Process

Lecture 209 Exercises

Lecture 210 Attack Frameworks

Lecture 211 Additional Plans

Lecture 212 Demo - Examining IRPs

Lecture 213 Topic B: Understanding Digital Forensics

Lecture 214 Introduction to Forensics

Lecture 215 Evidence Categories

Lecture 216 Documentation and Evidence

Lecture 217 Acquisition Concepts

Lecture 218 Integrity

Lecture 219 Additional Concepts

Lecture 220 Chapter 9 Review

Section 11: Chapter 10 - Governance, Risk, and Compliance

Lecture 221 Governance, Risk, and Compliance

Lecture 222 Topic A: Introduction to Control Types

Lecture 223 Security Controls

Lecture 224 Control Categories

Lecture 225 Control Types

Lecture 226 Topic B: Understanding Governance

Lecture 227 Introduction to Governance

Lecture 228 Regulations and Standards

Lecture 229 Key Frameworks

Lecture 230 Benchmarks

Lecture 231 Demo - Data Loss Prevention (DLP)

Lecture 232 Topic C: Implementing Security Policies

Lecture 233 Personnel-Based Policies

Lecture 234 Personnel-Based Policies (cont.)

Lecture 235 Third-Party Risk Management

Lecture 236 Data

Lecture 237 Credential Policies

Lecture 238 Topic D: Implementing Risk Management

Lecture 239 Risk Types

Lecture 240 Risk Management Strategies

Lecture 241 Risk Analysis

Lecture 242 Risk Analysis (cont.)

Lecture 243 Disasters

Lecture 244 Business Impact Analysis

Lecture 245 Topic E: Compliance with Privacy and Sensitive Data

Lecture 246 Organizational Consequences

Lecture 247 Data Types

Lecture 248 Privacy Enhancing Technologies

Lecture 249 Roles and Responsibilities

Lecture 250 Chapter 10 Review

Lecture 251 Course Closure

Section 12: Chapter 01 - Identifying Security Fundamentals

Lecture 252 Tokens

Lecture 253 Symmetric Encryption

Candidates looking to clear the CompTIA Security+ (SY0-601) certification exam,Information technology professionals,Information security personnel,Students of network and information security,Security analysts,SOC analysts and engineers