Tags
Language
Tags
April 2024
Su Mo Tu We Th Fr Sa
31 1 2 3 4 5 6
7 8 9 10 11 12 13
14 15 16 17 18 19 20
21 22 23 24 25 26 27
28 29 30 1 2 3 4

Comptia Security+ (Sy0-601) Course With Practice Exam

Posted By: ELK1nG
Comptia Security+ (Sy0-601) Course With Practice Exam

Comptia Security+ (Sy0-601) Course With Practice Exam
Published 4/2023
MP4 | Video: h264, 1280x720 | Audio: AAC, 44.1 KHz
Language: English | Size: 19.51 GB | Duration: 24h 15m

Full Practice Exam | Simulated PBQs | Video Lessons | Everything you need to pass the CompTIA Security+ SY0-601 exam

What you'll learn

Get access to this complete and high-quality course for the CompTIA Security+ SY0-601 certification exam

Pass the CompTIA Security+ with confidence and learn practical skills you can directly apply on-the-job

Common threats, attacks, and vulnerabilities (social engineering, malware, network-based, cloud-based, supply-chain, etc…) and how to defend against them

Proper security architecture and design for: enterprise environments, cloud computing, app development, authentication & authorization, and more

How to properly implement secure protocols, host & app security solutions, secure network designs, mobile solutions, cloud solutions, PKI, and more

Incident response approaches: selecting the right tools, policies, processes, and procedures, key aspects of digital forensics, and mitigation techniques

Governance, Risk, and Compliance concepts: controls, frameworks, regulations & standards, policies, risk management, and privacy for the enterprise

Full practice exam (multiple choice Q&A) and Performance-Based Questions (PBQs) with explanations included!

Requirements

Basic familiarity with computers

The course covers all topics in detail, but a general understanding of networking is helpful

No prior certifications required

Windows / Mac OS / Linux machine with internet access

Description

Welcome! I'm here to help you prepare for and PASS the CompTIA Security+ SY0-601 exam!Whether you are new to IT or you already have experience, my course is designed to help you learn all of the topics you need.–––––––––––-Are you trying to get started in cybersecurity? Or are you looking to get a higher-paying job?The CompTIA Security+ certification is one of the most well-known cybersecurity certifications. It can not only provide you with more job opportunities, but it also provides you with a learning path of important cybersecurity topics you need to understand in order to have a successful career in this space. In fact, certain jobs require that you have at least one IT certification, and the Security+ can often qualify as one of those certifications.By the way, my name is Christophe Limpalair and I’m the founder of Cybr, a cybersecurity training platform, and the author of this all-in-one Security+ course. I have over 7 years of training experience, and I’ve been in IT for about 20 years. I’ve taught tens of thousands of students in cybersecurity, cloud computing, and web development, and I look forward to helping you get certified.I've personally taken and passed this exam, so I know exactly what you need to learn and how, and I've sprinkled in tips and tricks throughout the course that will help you get ready for the real exam. I specifically designed this course syllabus to match the official CompTIA Exam Objectives so that you can keep track of what you’ve learned and what you still need to learn.This exam has 5 different domains:Domain 1 is about Attacks, Threats, and Vulnerabilities – which is 24% of the examDomain 2 is about Architecture and Design – which is 21% of the examDomain 3 is about Implementation – which is 25% of the examDomain 4 is about Operations and Incident Response – which is 16% of the examDomain 5 is about Governance, Risk, and Compliance – which is 14% of the examWithin these domains, you will learn about malware, web/cloud/network attacks, cryptography, network configurations, authentication, and much, much more.If any of those topics sound overwhelming to you — don’t worry! I walk you through it all lesson by lesson.In fact, this course has over 300 video lessons which is over 23 hours of high-quality video content as well as additional learning materials including a study template you can customize, a full list of Security+ acronyms and their definitions, and knowledge check quizzes.I’ve even included a multiple-choice practice exam at the end of the course to validate your knowledge and understanding, and I provide free access to multiple Performance-Based Questions (PBQs) that you can take and that mimic PBQs you can expect to see on the exam.On top of the training you receive, you get access to Cybr’s free Discord community where you can meet others who are actively studying for the Security+ or who have passed it and can provide you with tips and tricks.If you still have doubts, by the way, I provide a 30-day money-back policy pursuant to Udemy's refund policies.With an increasing demand for cybersecurity jobs, getting started with this course is a no-brainer. Let’s get started, and let’s take your career to the next level!I’ll see you in the course!–––––––––––-About the InstructorHi, my name is Christophe Limpalair, and I will be your instructor for this course. I got my start in IT at the age of 11 building websites for organizations. This is where I first learned the importance of writing secure code because some of my websites got hacked and I had to figure out how. Back then, there weren't very many affordable learning resources for this topic, so figuring this out was very painful at times. That's when I first started to realize that more training was needed in IT. Fast-forward a few years, and this thing called "AWS" was becoming more and more popular. I started learning how it worked by migrating a few of my projects to it, and I fell in love. Cloud computing was the real deal and I knew it was going to become more and more important over time, so I learned as much of it as I could. Around the same time, I founded a training platform for developers which got acquired by Linux Academy in 2016. There, I authored multiple AWS courses including: AWS Lambda Deep Dive, AWS Certified Developer Associate (certification course), AWS Certified DevOps Engineer Professional (certification course), AWS Backup Strategies, and more. I also helped build and secure our Hands-On Labs platform which was constantly under attack because malicious actors wanted to abuse our lab platform to mine cryptocurrency or to launch external attacks from our infrastructure. At the same time, many of our business customers were also sharing that they had issues and concerns with making sure their cloud environments and resources were secure, especially as they were migrating from on-prem.Once Linux Academy was acquired and merged with ACloudGuru in 2019, I decided to launch my own training platform called Cybr to provide affordable cybersecurity training, including this course and AWS cloud security courses, as well as ethical hacking courses.Long story short, I've been in IT for about 20 years and I've gotten exposure to web development, cloud computing, and cybersecurity. These are all topics I'm passionate about and that are needed to understand for the Security+ exam, and I love giving back because so many people have helped me along my journey. That's why I've been creating both free and affordable training material for over 7 years, and that's why I created a free community that all are welcome to join. I hope to see you in my community and in my course!–––––––––––-This course also comes with:Lifetime access to the contentUdemy Certificate of CompletionFree access to a cybersecurity communityNotion study template you can fully customizeFull list of Security+ acronyms and their definitionsFull practice exam (multiple choice Q&A) with explanationsPerformance-Based Questions (PBQs) with explanationsLet's get you CompTIA Security+ certified!

Overview

Section 1: About the course and exam

Lecture 1 About the course and certification

Lecture 2 About the course author

Lecture 3 Pre-requisites

Lecture 4 Tools and tips to help you study more efficiently

Lecture 5 Study techniques that will help you pass

Lecture 6 What surprised me the most about the exam

Lecture 7 Join our Discord community for support and interaction

Lecture 8 Acronym definitions and study template

Section 2: Domain 1: Threats, Attacks, and Vulnerabilities

Lecture 9 About threats, attacks, and vulnerabilities

Section 3: 1.1: Compare and contrast social engineering techniques

Lecture 10 What is social engineering?

Lecture 11 Principles

Lecture 12 Spam

Lecture 13 Blocking and Managing Spam

Lecture 14 Phishing

Lecture 15 Smishing

Lecture 16 Vishing

Lecture 17 Spear phishing

Lecture 18 Whaling

Lecture 19 Impersonation

Lecture 20 Dumpster diving

Lecture 21 Shoulder surfing

Lecture 22 Pharming

Lecture 23 Tailgating

Lecture 24 Eliciting information

Lecture 25 Prepending

Lecture 26 Identity fraud

Lecture 27 Invoice scams

Lecture 28 Credentials harvesting

Lecture 29 Reconnaissance

Lecture 30 Hoax

Lecture 31 Watering hole attack

Lecture 32 Typo squatting and URL Hijacking

Lecture 33 Influence campaigns

Lecture 34 Hybrid warfare

Section 4: 1.2: Analyze potential indicators to determine the type of attack

Lecture 35 What is malware?

Lecture 36 Malware classification

Lecture 37 Virus

Lecture 38 Worms

Lecture 39 Backdoor

Lecture 40 Trojans

Lecture 41 Remote access Trojan (RAT)

Lecture 42 Ransomware and Crypto Malware

Lecture 43 How does ransomware work?

Lecture 44 Potentially unwanted programs (PUPs)

Lecture 45 Spyware

Lecture 46 Adware & Malvertising

Lecture 47 Keyloggers

Lecture 48 Fileless malware

Lecture 49 Logic bombs

Lecture 50 Rootkit

Lecture 51 Bots and Botnets

Lecture 52 Command and control

Lecture 53 What are password attacks?

Lecture 54 Plaintext, encrypted, and hashed passwords

Lecture 55 Brute force

Lecture 56 Dictionary attacks

Lecture 57 Spraying attacks

Lecture 58 Rainbow and hash tables

Lecture 59 Credential stuffing

Lecture 60 What are physical attacks?

Lecture 61 Malicious universal serial bus (USB) cable

Lecture 62 Malicious flash drive

Lecture 63 Card cloning

Lecture 64 Skimming

Lecture 65 What is adversarial AI and tainted training for ML?

Lecture 66 Supply-chain attacks

Lecture 67 Cloud-based vs. on-premises attacks

Lecture 68 Cryptography concepts

Lecture 69 Cryptographic attacks

Section 5: 1.3: Analyze potential indicators associated with application attacks

Lecture 70 Privilege escalation

Lecture 71 Improper input handling

Lecture 72 Improper error handling

Lecture 73 Cross-Site Scripting (XSS)

Lecture 74 Structured query language (SQL Injections)

Lecture 75 Dynamic Link Library (DLL Injections)

Lecture 76 Lightweight directory access protocol (LDAP Injections)

Lecture 77 Extensible Markup Language (XML) and XPATH Injections

Lecture 78 XXE Injections

Lecture 79 Directory traversal

Lecture 80 Request forgeries

Lecture 81 Application Programming Interface (API) attacks

Lecture 82 Secure Sockets Layer (SSL) stripping

Lecture 83 Replay attack (session replays)

Lecture 84 Pass the hash

Lecture 85 Race conditions (time of check and time of use)

Lecture 86 Resource exhaustion

Lecture 87 Memory leak

Lecture 88 Pointer/object dereference

Lecture 89 Integer overflow

Lecture 90 Buffer overflows

Lecture 91 Driver manipulation (shimming and refactoring)

Section 6: 1.4: Analyze potential indicators of network attacks

Lecture 92 What are wireless attacks?

Lecture 93 Distributed Denial of Service (DDoS)

Lecture 94 Rogue access point and Evil Twin

Lecture 95 Bluesnarfing and Bluejacking

Lecture 96 Disassociation and Jamming

Lecture 97 Radio Frequency Identifier (RFID) attacks

Lecture 98 Near Field Communication (NFC) attacks

Lecture 99 Initialization Vector (IV)

Lecture 100 Man in the middle

Lecture 101 Man in the browser

Lecture 102 What are layer 2 attacks?

Lecture 103 Address resolution protocol (ARP) poisoning

Lecture 104 Media access control (MAC) flooding

Lecture 105 MAC cloning & spoofing

Lecture 106 What are Domain Name System (DNS) attacks and defenses?

Lecture 107 Domain hijacking

Lecture 108 DNS poisoning

Lecture 109 Universal resource locator (URL) redirection

Lecture 110 Domain reputation

Section 7: 1.5: Explain threat actors, vectors, and intelligence sources

Lecture 111 What are actors and threats?

Lecture 112 Attributes of actors

Lecture 113 Vectors

Lecture 114 Insider threats

Lecture 115 State actors

Lecture 116 Hacktivists

Lecture 117 Script kiddies

Lecture 118 Hackers (white hat, black hat, gray hat)

Lecture 119 Criminal syndicates

Lecture 120 Advanced persistent threat (APT)

Lecture 121 Shadow IT

Lecture 122 Competitors

Lecture 123 Threat intelligence sources (OSINT and others)

Lecture 124 Using threat intelligence

Lecture 125 Research sources

Section 8: 1.6: Security concerns associated with various vulnerabilities

Lecture 126 Cloud-based vs. on-premises vulnerabilities

Lecture 127 Zero-day vulnerabilities

Lecture 128 Weak configurations

Lecture 129 Weak encryption, hashing, and digital signatures

Lecture 130 Third-party risks

Lecture 131 Improper or weak patch management

Lecture 132 Legacy platforms

Lecture 133 Impacts

Section 9: 1.7 Summarizing techniques used in security assessments

Lecture 134 Threat hunting

Lecture 135 Vulnerability scans

Lecture 136 Syslog/Security information and event management (SIEM)

Lecture 137 Security orchestration, automation, response (SOAR)

Section 10: 1.8 Explaining techniques used in penetration testing

Lecture 138 Important pentesting concepts

Lecture 139 Bug bounties

Lecture 140 Exercise types (red, blue, white, and purple teams)

Lecture 141 Passive and active reconnaissance

Section 11: Domain 2: Architecture and Design

Lecture 142 About architecture and design

Section 12: 2.1: Explaining the importance of security concepts in an enterprise environment

Lecture 143 Configuration management

Lecture 144 Data sovereignty

Lecture 145 Data protection

Lecture 146 Hardware security module (HSM) and Trusted Platform Module (TPM)

Lecture 147 Geographical considerations

Lecture 148 Cloud access security broker (CASB)

Lecture 149 Response and recovery controls

Lecture 150 Secure Sockets Layer (SSL) and Transport Layer Security (TLS) inspection

Lecture 151 Hashing

Lecture 152 API considerations

Lecture 153 Site resiliency

Lecture 154 Deception and disruption

Section 13: 2.2: Virtualization and cloud computing concepts

Lecture 155 Comparing cloud models

Lecture 156 Cloud service providers

Lecture 157 Virtualization

Lecture 158 Containers

Lecture 159 Microservices and APIs

Lecture 160 Serverless architecture

Lecture 161 MSPs and MSSPs

Lecture 162 On-premises vs. off-premises

Lecture 163 Edge computing

Lecture 164 Fog computing

Lecture 165 Thin client

Lecture 166 Infrastructure as Code (IaC)

Lecture 167 Services integration

Lecture 168 Resource policies

Lecture 169 Transit gateway

Section 14: 2.3: Secure application development, deployment, and automation concepts

Lecture 170 Understanding development environments

Lecture 171 Automation and scripting

Lecture 172 Version control

Lecture 173 Secure coding techniques

Lecture 174 Open Web Application Security Project (OWASP)

Lecture 175 Integrity measurement

Lecture 176 Software diversity

Lecture 177 Provisioning and deprovisioning

Lecture 178 Elasticity

Lecture 179 Scalability

Section 15: 2.4: Authentication and authorization design concepts

Lecture 180 Important authentication and authorization concepts

Lecture 181 Multifactor authentication (MFA) factors and attributes

Lecture 182 Authentication technologies

Lecture 183 Biometrics techniques and concepts

Lecture 184 Authentication, authorization, and accounting (AAA)

Lecture 185 Cloud vs. on-premises requirements

Section 16: 2.5: Implementing cybersecurity resilience

Lecture 186 What is redundancy

Lecture 187 Disk redundancy (RAID levels)

Lecture 188 Network redundancy

Lecture 189 Power redundancy

Lecture 190 Replication

Lecture 191 Backup types (full, incremental, differential, and snapshot)

Lecture 192 Backup types practice scenarios

Lecture 193 Backup devices and strategies

Lecture 194 Non-persistence

Lecture 195 Restoration order

Lecture 196 Diversity

Section 17: 2.6: Security implications of embedded and specialized systems

Lecture 197 What are embedded systems?

Lecture 198 System on a Chip (SoC)

Lecture 199 SCADA and ICS

Lecture 200 Internet of Things (IoT)

Lecture 201 Specialized systems

Lecture 202 VoIP, HVAC, Drones/AVs, MFP, RTOS, Surveillance systems

Lecture 203 Communication considerations

Lecture 204 Important constraints

Section 18: 2.7: Importance of physical security controls

Lecture 205 Bollards/barricades, Mantraps, Badges, Alarms, Signage

Lecture 206 Lighting and fencing

Lecture 207 Cameras and Closed-circuit television (CCTV)

Lecture 208 Industrial camouflage

Lecture 209 Personnel, robots, drones/UAVs

Lecture 210 Locks

Lecture 211 Different sensors

Lecture 212 Fire suppression

Lecture 213 Protected cable distribution (PCD)

Lecture 214 Secure areas (air gap, faraday cages, DMZ, etc…)

Lecture 215 Hot and cold aisles

Lecture 216 Secure data destruction

Lecture 217 USB data blocker

Section 19: 2.8: Basics of cryptography

Lecture 218 Common use cases

Lecture 219 Key length

Lecture 220 Key stretching

Lecture 221 Salting, hashing, digital signatures

Lecture 222 Perfect forward secrecy

Lecture 223 Elliptic curve cryptography

Lecture 224 Ephemeral

Lecture 225 Symmetric vs. asymmetric encryption

Lecture 226 Key exchange

Lecture 227 Cipher suites

Lecture 228 Modes of operation

Lecture 229 Lightweight cryptography and Homomorphic encryption

Lecture 230 Steganography

Lecture 231 Blockchain

Lecture 232 Quantum and post-quantum

Lecture 233 Limitations

Section 20: Domain 3: Implementation

Lecture 234 About implementation

Section 21: 3.1: Implement Secure Protocols

Lecture 235 Important protocols to know and use cases

Lecture 236 Important email secure protocols

Lecture 237 IPsec and VPN

Lecture 238 FTPS, SFTP, SCP

Lecture 239 DNSSEC

Lecture 240 SRTP and NTPsec

Lecture 241 DHCP

Lecture 242 SNMP and SNMPv3

Section 22: 3.2: Implement host or application security solutions

Lecture 243 Endpoint protection

Lecture 244 Self-encrypting drive (SED), full disk encryption (FDE), and file-level encrypti

Lecture 245 Boot integrity

Lecture 246 Database and data security

Lecture 247 Application security

Lecture 248 Hardening hosts

Lecture 249 Sandboxing

Section 23: 3.3: Implement secure network designs

Lecture 250 DNS

Lecture 251 Load balancing

Lecture 252 Network segmentation

Lecture 253 East-West and North-South

Lecture 254 Jump servers (bastion hosts)

Lecture 255 NAT Gateways

Lecture 256 Proxy servers

Lecture 257 Out-of-band management

Lecture 258 Virtual Private Networks (VPNs) and IPsec

Lecture 259 Network Access Control (NAC)

Lecture 260 Port security

Lecture 261 Network-based intrusion detection and prevention system (NIDS and NIPS)

Lecture 262 Firewalls

Lecture 263 Next-Generation Firewalls

Lecture 264 Access Control List (ACL) and Security Groups (SGs)

Lecture 265 Quality of Service (QoS)

Lecture 266 Implications of IPv6

Lecture 267 Port scanning and port mirroring

Lecture 268 File integrity monitors

Section 24: 3.4: Install and configure wireless security settings

Lecture 269 Cryptographic protocols

Lecture 270 Methods

Lecture 271 Authentication protocols

Lecture 272 Installation considerations

Section 25: 3.5: Implement secure mobile solutions

Lecture 273 Connection methods and receivers

Lecture 274 Mobile deployment models

Lecture 275 Mobile device management (MDM)

Lecture 276 Mobile devices

Lecture 277 Enforcement and monitoring

Section 26: 3.6: Apply cybersecurity solutions to the cloud

Lecture 278 Cloud security controls

Lecture 279 Secure cloud storage

Lecture 280 Secure cloud networking

Lecture 281 Secure cloud compute resources

Lecture 282 Secure cloud solutions

Section 27: 3.7: Implement identity and account management controls

Lecture 283 Understanding identity

Lecture 284 Account types to consider

Lecture 285 Account policies to consider

Section 28: 3.8: Implement authentication and authorization solutions

Lecture 286 Authentication management

Lecture 287 Authentication protocols and considerations

Lecture 288 Extensible Authentication Protocol (EAP)

Lecture 289 RADIUS and TACACS+

Lecture 290 Kerberos, LDAP, and NTLM

Lecture 291 Federated Identities

Lecture 292 Access control schemes

Section 29: 3.9: Implement public key infrastructure

Lecture 293 What is public key infrastructure?

Lecture 294 Types of certificates

Lecture 295 Certificate formats

Lecture 296 Important concepts

Section 30: Domain 4: Operations and Incident Response

Lecture 297 About operations and incident response

Section 31: 4.1: Use the appropriate tools to assess organizational security

Lecture 298 Network reconnaissance and discovery part 1

Lecture 299 Network reconnaissance and discovery part 2

Lecture 300 File manipulation

Lecture 301 Shell and script environments

Lecture 302 Packet capture and replay

Lecture 303 Forensics tools

Lecture 304 Exploitation frameworks

Lecture 305 Password crackers

Lecture 306 Data sanitization

Section 32: 4.2: Policies, processes, and procedures for incident response

Lecture 307 Incident response plans

Lecture 308 Incident response process

Lecture 309 Important exercises

Lecture 310 Important attack frameworks

Lecture 311 BCP, COOP, and DRP

Lecture 312 Incident response team and stakeholder management

Lecture 313 Retention policies

Section 33: 4.3: Using appropriate data sources to support investigations after an incident

Lecture 314 Vulnerability scan outputs

Lecture 315 SIEM dashboards

Lecture 316 Log files

Lecture 317 Syslog, rsyslog, syslog-ng

Lecture 318 Journald and journalctl

Lecture 319 NXLog

Lecture 320 Bandwidth and network monitors

Lecture 321 Important and useful metadata

Section 34: 4.4: Applying mitigation techniques or controls to secure environments during an

Lecture 322 Reconfiguring endpoint security solutions

Lecture 323 Configuration changes

Lecture 324 Isolation, containment, and segmentation

Lecture 325 Secure Orchestration, Automation, and Response (SOAR)

Section 35: 4.5: Key aspects of digital forensics

Lecture 326 Documentation and evidence

Lecture 327 E-discovery, data recovery, and non-repudiation

Lecture 328 Integrity and preservation of information

Lecture 329 Acquisition

Lecture 330 On-premises vs. cloud

Lecture 331 Strategic intelligence and counterintelligence

Section 36: Domain 5: Governance, Risk, and Compliance

Lecture 332 About governance, risk and compliance

Section 37: 5.1: Compare and contrast various types of controls

Lecture 333 Categories

Lecture 334 Control types

Section 38: 5.2 Applicable regulations/standards/frameworks that impact security posture

Lecture 335 Regulations, standards, and legislation

Lecture 336 Key frameworks to know about

Lecture 337 Benchmarks and secure configuration guides

Section 39: 5.3: Importance of policies to organizational security

Lecture 338 Personnel

Lecture 339 User training

Lecture 340 Third-party risk management

Lecture 341 Data

Lecture 342 Credential policies

Lecture 343 Organizational policies

Section 40: 5.4: Risk management processes and concepts

Lecture 344 Types of risks

Lecture 345 Risk management strategies

Lecture 346 Risk analysis

Lecture 347 Disasters

Lecture 348 Business impact analysis

Section 41: 5.5: Privacy and sensitive data concepts in relation to security

Lecture 349 Organizational consequences of privacy breaches

Lecture 350 Notifications of breaches

Lecture 351 Data types

Lecture 352 Privacy enhancing technologies

Lecture 353 Roles and responsibilities

Section 42: Practice Exams and Next Steps

Lecture 354 What should you do next?

Lecture 355 Bonus: FREE Performance-Based Questions (PBQs)

Learners who want to pass the CompTIA Security+ certification,Learners who want to build a solid foundation for cybersecurity by learning best practices,Learners who are seeking a career in cybersecurity,Learners who wish to learn more about common threats facing IT systems, networks, applications, and the cloud