Tags
Language
Tags
June 2025
Su Mo Tu We Th Fr Sa
1 2 3 4 5 6 7
8 9 10 11 12 13 14
15 16 17 18 19 20 21
22 23 24 25 26 27 28
29 30 1 2 3 4 5
    Attention❗ To save your time, in order to download anything on this site, you must be registered 👉 HERE. If you do not have a registration yet, it is better to do it right away. ✌

    ( • )( • ) ( ͡⚆ ͜ʖ ͡⚆ ) (‿ˠ‿)
    SpicyMags.xyz

    Comptia Security+ (Exam Sy0-601)

    Posted By: ELK1nG
    Comptia Security+ (Exam Sy0-601)

    Comptia Security+ (Exam Sy0-601)
    Last updated 4/2022
    MP4 | Video: h264, 1280x720 | Audio: AAC, 44.1 KHz
    Language: English | Size: 2.42 GB | Duration: 10h 48m

    CompTIA Security+ (Exam SY0-601)

    What you'll learn
    Understand threats, attacks, and vulnerabilities
    Analyze attacks
    Learn about enterprise security architecture
    Design authentication and authorization
    Understand cloud and virtualization concepts
    Secure application development and deployment
    Implement physical security controls
    Secure embedded and specialized systems
    Learn about cryptographic concepts
    Implement public key infrastructures
    Implement secure networks
    Implement secure mobile solutions
    Implement secure hosts and identities
    Use tools to assess security
    Utilize data sources for investigation
    Apply mitigation techniques
    Learn about incident response and forensics
    Understand governance, risk, and compliance
    Requirements
    The course starts with the basics of information and network security. Hence, no prior knowledge of information security is required. However, the candidates are expected to have a fair knowledge of basic networking and computing concepts such as system administration, network administration, TCP/IP, routing, switching etc.
    In addition to this, the candidates are also recommended to have studied the CompTIA A+ certification course or possess the equivalent knowledge.
    Description
    Information and network security has become an important topic of discussion in recent times and the focus of almost every organization on information and network security is increasing with each passing day. This is primarily due to increased reliance on digital systems for day-to-day operations. There is a substantial amount of data residing on the digital systems that lures hackers and state actors towards illegally accessing and using it for monetary benefits and other political reasons.This course prepares the candidates to appear in the CompTIA Security+ (SY0-601) exam. The CompTIA Security+ exam is a foundational exam for aspiring information security professionals and enables them to understand different threats, analyze attacks, learn cryptography, implement secure networks, devise operational procedures, perform forensic analysis and more to ensure integrity and protection of sensitive data.This course also provides the basis to build on the knowledge gained and advance towards other professional certifications in the field of information and network security. This can be a great career move for young IT professionals to explore the in-demand network and information security arena. The CompTIA Security+ is the premier vendor-neutral security certification. This preparatory course for the CompTIA Security+ certification exam assures that the students completely learn and understand the exam topics of the latest SY0-601 exam version. The students will be able to demonstrate their knowledge of security concepts, tools, and procedures. It also confirms their ability to react to security incidents, and validates their skills in anticipating security risks and guarding against them. Overall, the course is very well designed to give a detailed overview of network and information security concepts and practical implications to the students. This helps them to appear in the CompTIA Security+ exam as well as polish their skills to improve their productivity in their jobs.

    Overview

    Section 1: Course Introduction

    Lecture 1 Instructor Introduction

    Lecture 2 Course Introduction

    Section 2: Chapter 1 - Understanding Threats, Attacks, and Vulnerabilities

    Lecture 3 Understanding Threats, Attacks, and Vulnerabilities

    Lecture 4 Topic A: Introduction to Security Concepts

    Lecture 5 Security Fundamentals

    Lecture 6 Security Terms

    Lecture 7 Topic B: Identifying Threat Actors and Vectors

    Lecture 8 Actors and Threats

    Lecture 9 Hackers

    Lecture 10 Actor Attributes

    Lecture 11 Attack Vectors

    Lecture 12 Information Gathering

    Lecture 13 Intelligence Sources

    Lecture 14 Research Sources

    Lecture 15 Demo - Research Sources

    Lecture 16 Topic C: Understanding Vulnerabilities

    Lecture 17 Vulnerability Fundamentals

    Lecture 18 Security Impacts

    Lecture 19 Vulnerability Types

    Lecture 20 Vulnerability Types (cont.)

    Lecture 21 Topic D: Understanding Attack Types

    Lecture 22 Attack Types

    Lecture 23 Understanding Malware Types

    Lecture 24 Attacking Passwords and User Credentials

    Lecture 25 Physical Attacks

    Lecture 26 Other Attack Types

    Lecture 27 Topic E: Identifying Social Engineering Techniques

    Lecture 28 Social Engineering Principles

    Lecture 29 Phishing

    Lecture 30 Other Social Engineering Types

    Lecture 31 Other Social Engineering Types (cont.)

    Lecture 32 Chapter 1 Review

    Section 3: Chapter 2 - Analyzing Attacks

    Lecture 33 Analyzing Attacks

    Lecture 34 Topic A: Security Assessment Tools and Techniques

    Lecture 35 Understanding Assessments

    Lecture 36 Threat Hunting

    Lecture 37 Vulnerability Scanning

    Lecture 38 Syslog and SIEM

    Lecture 39 SIEM Components

    Lecture 40 Topic B: Application Attacks

    Lecture 41 Application Attacks

    Lecture 42 Privilege Escalation

    Lecture 43 Cross-Site Scripting

    Lecture 44 Injections

    Lecture 45 Application Attack Issues

    Lecture 46 Session Attacks

    Lecture 47 Additional Attacks

    Lecture 48 Topic C: Network Attacks

    Lecture 49 Introduction to Network Attacks

    Lecture 50 Wireless Network Attacks

    Lecture 51 Layer 2 Attacks

    Lecture 52 Service Attacks

    Lecture 53 Demo - DNS Poisoning

    Lecture 54 Malicious Code

    Lecture 55 Topic D: Penetration Testing

    Lecture 56 Penetration Testing

    Lecture 57 Environment Types

    Lecture 58 Pentesting Concepts

    Lecture 59 Network Reconnaissance

    Lecture 60 Exercise Types

    Lecture 61 Chapter 2 Review

    Section 4: Chapter 3 - Architecture and Design

    Lecture 62 Architecture and Design

    Lecture 63 Topic A: Enterprise Security Architecture

    Lecture 64 Enterprise Standardization Needs

    Lecture 65 Configuration Management

    Lecture 66 Data Protection

    Lecture 67 Additional Security Concepts

    Lecture 68 Disaster Recovery

    Lecture 69 Deception and Disruption

    Lecture 70 Topic B: Designing Authentication and Authorization

    Lecture 71 Authentication and Authorization

    Lecture 72 Authentication Methods

    Lecture 73 Authentication Technologies

    Lecture 74 Biometrics

    Lecture 75 Multifactor Authentication

    Lecture 76 Demo - Multifactor Authentication

    Lecture 77 Topic C: Designing Resiliency

    Lecture 78 Resiliency and Cybersecurity

    Lecture 79 Redundancy Concepts

    Lecture 80 Replication Concepts

    Lecture 81 Backup Concepts

    Lecture 82 Additional Resiliency Options

    Lecture 83 Topic D: Cloud and Virtualization Concepts

    Lecture 84 Cloud Models

    Lecture 85 Cloud Types

    Lecture 86 Cloud Service Providers

    Lecture 87 Additional Cloud Concepts

    Lecture 88 Additional Cloud Concepts (cont.)

    Lecture 89 Demo - Cloud Computing Security

    Lecture 90 Topic E: Securing Application Development and Deployment

    Lecture 91 Application Development Environments

    Lecture 92 Secure Coding Techniques

    Lecture 93 Automation Techniques

    Lecture 94 Application Design Concepts

    Lecture 95 Chapter 3 Review

    Section 5: Chapter 4 - Physical and System Security

    Lecture 96 Physical and System Security

    Lecture 97 Topic A: Physical Security Controls

    Lecture 98 Importance of Physical Controls

    Lecture 99 Standard Controls

    Lecture 100 Security Monitoring

    Lecture 101 Security Personnel

    Lecture 102 Secure Areas

    Lecture 103 Secure Data Destruction

    Lecture 104 Demo - Data Destruction Software

    Lecture 105 Topic B: Securing Embedded and Specialized Systems

    Lecture 106 Embedded Systems

    Lecture 107 Specialized Systems

    Lecture 108 Additional System Types

    Lecture 109 Communication Considerations

    Lecture 110 Constraints

    Lecture 111 Chapter 4 Review

    Section 6: Chapter 5 - Cryptography

    Lecture 112 Cryptography

    Lecture 113 Topic A: Cryptographic Concepts

    Lecture 114 Introduction to Cryptography

    Lecture 115 Common Use Cases

    Lecture 116 Integrity Verification

    Lecture 117 Understanding Keys

    Lecture 118 Crypto Limitations

    Lecture 119 Quantum

    Lecture 120 Additional Cryptographic Types

    Lecture 121 Topic B: Public Key Infrastructures

    Lecture 122 Introduction to PKIs

    Lecture 123 Certificate Authorities

    Lecture 124 Certificates

    Lecture 125 Certificate Verification

    Lecture 126 Certificate Formats

    Lecture 127 Demo - Implementing PKI

    Lecture 128 Additional Concepts

    Lecture 129 Chapter 5 Review

    Section 7: Chapter 6 - Implementing Secure Networks

    Lecture 130 Implementing Secure Networks

    Lecture 131 Topic A: Implement Secure Protocols

    Lecture 132 Network Protocols

    Lecture 133 Use Cases

    Lecture 134 Application Layer Protocols

    Lecture 135 IP Security

    Lecture 136 Topic B: Implement Secure Network Designs

    Lecture 137 Network Segmentation

    Lecture 138 High Availability

    Lecture 139 Virtual Private Networks

    Lecture 140 Secure Network Appliances

    Lecture 141 Firewalls

    Lecture 142 Demo - Configuring a Host-Based Firewall

    Lecture 143 Additional Network Security Concepts

    Lecture 144 Topic C: Implementing Security in the Cloud

    Lecture 145 Cloud Security Controls

    Lecture 146 Cloud Storage Security

    Lecture 147 Cloud Network Security

    Lecture 148 Compute Security

    Lecture 149 Additional Cloud Solutions

    Lecture 150 Topic D: Implement Wireless Security

    Lecture 151 Cryptographic Protocols

    Lecture 152 Authentication Protocols

    Lecture 153 Authentication Methods

    Lecture 154 Installation Considerations

    Lecture 155 Topic E: Implement Secure Mobile Solutions

    Lecture 156 Deployment Models

    Lecture 157 Connection Methods and Receivers

    Lecture 158 Mobile Device Management (MDM)

    Lecture 159 Mobile Devices

    Lecture 160 Enforcement and Monitoring

    Lecture 161 Additional Controls

    Lecture 162 Chapter 6 Review

    Section 8: Chapter 7 - Implementing Secure Hosts and Identities

    Lecture 163 Implementing Secure Hosts and Identities

    Lecture 164 Topic A: Implement Authentication and Authorization Systems

    Lecture 165 Understanding Identity

    Lecture 166 Access Control Methods

    Lecture 167 Demo - Role-Based Access Control

    Lecture 168 Authentication Management

    Lecture 169 Remote Access Authentication

    Lecture 170 Authentication and Authorization Protocols

    Lecture 171 Topic B: Implement Identity and Account Management Controls

    Lecture 172 Account Types

    Lecture 173 Account Policies

    Lecture 174 Demo - Configuring Account Policies

    Lecture 175 Additional Identity Terms

    Lecture 176 Topic C: Implement Host and Application Security Solutions

    Lecture 177 Endpoint Protection

    Lecture 178 Client Level Protections

    Lecture 179 Network Level Protections

    Lecture 180 Boot Integrity

    Lecture 181 Database Security

    Lecture 182 System Hardening

    Lecture 183 Application Security

    Lecture 184 Chapter 7 Review

    Section 9: Chapter 8 - Operational Procedures

    Lecture 185 Operational Procedures

    Lecture 186 Topic A: Using Tools to Assess Security

    Lecture 187 Network Reconnaissance and Discovery

    Lecture 188 Network Tools

    Lecture 189 Network Tools (cont.)

    Lecture 190 Demo - Using Network Tools

    Lecture 191 File Manipulation Tools

    Lecture 192 Packet Capture and Relay

    Lecture 193 Shell and Script Environments

    Lecture 194 Forensics Tools

    Lecture 195 Topic B: Utilizing Data Sources for Investigation

    Lecture 196 Vulnerability Scan Output

    Lecture 197 SIEM Dashboards

    Lecture 198 Log Files

    Lecture 199 Additional Monitoring

    Lecture 200 Topic C: Applying Mitigation Techniques

    Lecture 201 Reconfiguring Endpoint Solutions

    Lecture 202 Configuration Changes

    Lecture 203 Additional Mitigation Techniques

    Lecture 204 Chapter 8 Review

    Section 10: Chapter 9 - Incident Response and Forensics

    Lecture 205 Incident Response and Forensics

    Lecture 206 Topic A: Incident Response Policies and Procedures

    Lecture 207 Incident Response Plans

    Lecture 208 Incident Response Process

    Lecture 209 Exercises

    Lecture 210 Attack Frameworks

    Lecture 211 Additional Plans

    Lecture 212 Demo - Examining IRPs

    Lecture 213 Topic B: Understanding Digital Forensics

    Lecture 214 Introduction to Forensics

    Lecture 215 Evidence Categories

    Lecture 216 Documentation and Evidence

    Lecture 217 Acquisition Concepts

    Lecture 218 Integrity

    Lecture 219 Additional Concepts

    Lecture 220 Chapter 9 Review

    Section 11: Chapter 10 - Governance, Risk, and Compliance

    Lecture 221 Governance, Risk, and Compliance

    Lecture 222 Topic A: Introduction to Control Types

    Lecture 223 Security Controls

    Lecture 224 Control Categories

    Lecture 225 Control Types

    Lecture 226 Topic B: Understanding Governance

    Lecture 227 Introduction to Governance

    Lecture 228 Regulations and Standards

    Lecture 229 Key Frameworks

    Lecture 230 Benchmarks

    Lecture 231 Demo - Data Loss Prevention (DLP)

    Lecture 232 Topic C: Implementing Security Policies

    Lecture 233 Personnel-Based Policies

    Lecture 234 Personnel-Based Policies (cont.)

    Lecture 235 Third-Party Risk Management

    Lecture 236 Data

    Lecture 237 Credential Policies

    Lecture 238 Topic D: Implementing Risk Management

    Lecture 239 Risk Types

    Lecture 240 Risk Management Strategies

    Lecture 241 Risk Analysis

    Lecture 242 Risk Analysis (cont.)

    Lecture 243 Disasters

    Lecture 244 Business Impact Analysis

    Lecture 245 Topic E: Compliance with Privacy and Sensitive Data

    Lecture 246 Organizational Consequences

    Lecture 247 Data Types

    Lecture 248 Privacy Enhancing Technologies

    Lecture 249 Roles and Responsibilities

    Lecture 250 Chapter 10 Review

    Lecture 251 Course Closure

    Section 12: Chapter 01 - Identifying Security Fundamentals

    Lecture 252 Tokens

    Lecture 253 Symmetric Encryption

    Candidates looking to clear the CompTIA Security+ (SY0-601) certification exam,Information technology professionals,Information security personnel,Students of network and information security,Security analysts,SOC analysts and engineers