Tags
Language
Tags
December 2024
Su Mo Tu We Th Fr Sa
1 2 3 4 5 6 7
8 9 10 11 12 13 14
15 16 17 18 19 20 21
22 23 24 25 26 27 28
29 30 31 1 2 3 4

Comptia Security+ (Sy0-601) Complete Course & Exam

Posted By: ELK1nG
Comptia Security+ (Sy0-601) Complete Course & Exam

Comptia Security+ (Sy0-601) Complete Course & Exam
Last updated 7/2022
MP4 | Video: h264, 1280x720 | Audio: AAC, 44.1 KHz
Language: English | Size: 14.65 GB | Duration: 21h 18m

CompTIA Security+ (SY0-601) Bootcamp - Your preparation for the world's best cybersecurity certification!

What you'll learn
Passing the CompTIA Security+ certification exam with confidence
Understand computer security, its functions, and its components
Performing basic security configurations
Become an effective security technician in a business environment
Requirements
Basic familiarity with computer networks, administration, and security is helpful (But, all required information will be covered during the course)
(Helpful, but not required) Completion of the CompTIA A+ and Network+ certifications
Description
** Taught by a Best Selling IT Certification Instructor **Taught by an expert in information technology and cybersecurity with over 20 years of experience, this course is a fun way to master the fundamentals of computer security. My name is Jason Dion, and I have personally helped over 500,000 students earn their IT certifications, and now I can help you, too!You will learn the fundamentals of cybersecurity and gain experience in the configuration, management, and troubleshooting of common wired and wireless networks with lessons, lectures, and video demonstrations to teach you everything you need to know to pass the CompTIA Security+ exam. CompTIA Security+ (SY0-601) is the world's most popular cybersecurity certification today!This course is designed to help prepare you for the CompTIA Security (SY0-601) certification exam and covers all the domains the Security+ (SY0-601) certification exam:CompTIA Security+ (SY0-601):Attacks, Threats, and VulnerabilitiesArchitecture and DesignImplementationOperations and Incident ResponseGovernance, Risk, and ComplianceWhat You Will Receive In The Course:Video lectures with the essential information needed to pass the Security+ (SY0-601) examA complete downloadable study guide in PDF format based on the lessonsPractice quizzes to ensure mastery of each section of the courseA full-length practice exam with multiple choice and mock simulationsThis course stays current and up-to-date with the latest release of the CompTIA Security+ exam (SY0-601), and also provides a 30-day money-back guarantee if you are not satisfied with the quality of this course for any reason!What Other Students Are Saying About My CompTIA Security+ Course:I passed the Security+ exam. This course was absolutely essential to passing that exam. Only the Dion Security+ covered the topics comprehensively and thoroughly enough. No other resource I used came close. (Kolya, 5 stars)I have just completed watching two different instructor corses on the same subject. I must say, Dion's has more information in a better constructed manner. This course is not easy, it is heavy with information and having you sit through shorter videos was the best part. Having watched more than just Dion's, I can say he goes over the content much better. Very glad I chose to watch a second course! (Rutger, 5 stars)I love taking this wonderful course. It's full of important tips and amazing steps in order to pass CompTIA Security+. Thank you, Jason Dion, for making this incredible course! (Paul, 5 stars)Upon completion of this course, you will earn 21 CEUs towards the renewal of your CompTIA A+, Network+, Security+, Linux+, Cloud+, PenTest+, CySA+, or CASP+ certifications.

Overview

Section 1: Overview of Security

Lecture 1 Welcome

Lecture 2 Download the Study Guide

Lecture 3 Overview of Security

Lecture 4 CIA Triad

Lecture 5 AAA of Security (OBJ 2.4)

Lecture 6 Security Threats (OBJ 1.1 & 1.2)

Lecture 7 Mitigating Threats (OBJ 5.1)

Lecture 8 Hackers (OBJ 1.5)

Lecture 9 Threat Actors (1.5)

Lecture 10 Threat Intelligence and Sources (OBJ 1.5)

Lecture 11 Threat Hunting (OBJ 1.7)

Lecture 12 Attack Frameworks (OBJ 4.2)

Section 2: Malware

Lecture 13 Malware (OBJ 1.2)

Lecture 14 Viruses (OBJ 1.2)

Lecture 15 Worms (OBJ 1.2)

Lecture 16 Trojans (OBJ 1.2)

Lecture 17 Demo: Viruses and Trojans (OBJ 1.2)

Lecture 18 Ransomware (OBJ 1.2)

Lecture 19 Spyware (OBJ 1.2)

Lecture 20 Rootkits (OBJ 1.2 & 1.3)

Lecture 21 Spam (OBJ 1.1)

Lecture 22 Summary of Malware

Section 3: Malware Infections

Lecture 23 Malware Infections

Lecture 24 Common Delivery Methods (OBJ 1.1 & 1.5)

Lecture 25 Demo: Phishing (OBJ 1.1 & 5.3)

Lecture 26 Botnets and Zombies (OBJ 1.2 & 1.4)

Lecture 27 Active Interception and Privilege Escalation (OBJ 1.3 & 1.4)

Lecture 28 Demo: Privilege Escalation (OBJ 1.3 & 1.8)

Lecture 29 Backdoors and Logic Bombs (OBJ 1.2)

Lecture 30 Symptoms of Infection (OBJ 1.2)

Lecture 31 Removing Malware (OBJ 4.2)

Lecture 32 Preventing Malware (OBJ 1.6 & 3.2)

Lecture 33 Malware Exploitation (OBJ 1.2 & 1.4)

Section 4: Security Applications and Devices

Lecture 34 Security Applications and Devices

Lecture 35 Software Firewalls (OBJ 3.2)

Lecture 36 Demo: Software Firewalls (OBJ 3.2)

Lecture 37 IDS (OBJ 3.2 & 3.3)

Lecture 38 Pop-up Blockers (OBJ 1.1, 3.3, 4.4)

Lecture 39 Data Loss Prevention (DLP) (OBJ 2.1, 3.2, 4.4)

Lecture 40 Securing the BIOS (OBJ 3.2)

Lecture 41 Securing Storage Devices (OBJ 2.1, 2.5, & 3.3)

Lecture 42 Disk Encryption (OBJ 2.1, 2.8 & 3.2)

Lecture 43 Endpoint Analysis (OBJ 3.1 & 3.3)

Section 5: Mobile Device Security

Lecture 44 Mobile Device Security (OBJ 1.5)

Lecture 45 Securing Wireless Devices (OBJ 3.4 & 3.5)

Lecture 46 Mobile Malware (OBJ 1.1 & 3.5)

Lecture 47 SIM Cloning & ID Theft (OBJ 1.1, 2.4, & 2.6)

Lecture 48 Bluetooth Attacks (OBJ 1.4 & 3.4)

Lecture 49 Mobile Device Theft (OBJ 3.5)

Lecture 50 Security of Apps (OBJ 3.1 & 3.5)

Lecture 51 BYOD (OBJ 3.5)

Lecture 52 Hardening Mobile Devices (OBJ 3.5)

Section 6: Hardening

Lecture 53 Hardening (OBJ 3.2)

Lecture 54 Unnecessary Applications (OBJ 1.6)

Lecture 55 Restricting Applications (OBJ 3.2 & 4.4)

Lecture 56 Demo: Unnecessary Services (OBJ 3.2 & 3.3)

Lecture 57 Trusted Operating System (OBJ 3.2)

Lecture 58 Updates and Patches (OBJ 1.6 & 3.2)

Lecture 59 Patch Management (OBJ 1.6 & 3.2)

Lecture 60 Group Policies (OBJ 2.1)

Lecture 61 Demo: Group Policies (OBJ 3.2)

Lecture 62 File Systems and Hard Drives (OBJ 2.1 & 3.2)

Section 7: Supply Chain Management

Lecture 63 Supply Chain Assessment (OBJ 1.2, 1.5, & 1.6)

Lecture 64 Root of Trust (OBJ 3.2)

Lecture 65 Trusted Firmware (OBJ 3.2)

Lecture 66 Secure Processing (OBJ 3.2)

Section 8: Virtualization

Lecture 67 Virtualization (OBJ 2.2)

Lecture 68 Hypervisors (OBJ 2.2)

Lecture 69 Demo: How to create a VM (OBJ 2.2)

Lecture 70 Threats to VMs (OBJ 2.2)

Lecture 71 Securing VMs (OBJ 2.2)

Lecture 72 Demo: Securing VMs

Section 9: Application Security

Lecture 73 Application Security

Lecture 74 Web Browser Security (OBJ 3.2 & 3.3)

Lecture 75 Web Browser Concerns (OBJ 3.2 & 3.3)

Lecture 76 Demo: Web Browser Configuration (OBJ 3.2 & 3.3)

Lecture 77 Securing Applications (OBJ 1.4 & 3.2)

Section 10: Secure Software Development

Lecture 78 Software Development (OBJ 2.1 & 2.3)

Lecture 79 SDLC Principles (OBJ 1.6, 2.3, 3.2, & 5.3)

Lecture 80 Testing Methods (OBJ 2.3 & 3.2)

Lecture 81 Software Vulnerabilities and Exploits (OBJ 1.2, 1.3, & 1.6)

Lecture 82 Buffer Overflows (OBJ 1.3)

Lecture 83 Demo: Buffer Overflow Attack (OBJ 1.3)

Lecture 84 XSS and XSRF (OBJ 1.3)

Lecture 85 SQL Injection (OBJ 1.3)

Lecture 86 Demo: SQL Injection (OBJ 1.2 & 1.3)

Lecture 87 XML Vulnerabilities (OBJ 1.3)

Lecture 88 Race Conditions (OBJ 1.3)

Lecture 89 Design Vulnerabilities (OBJ 1.3)

Section 11: Network Design

Lecture 90 Network Security

Lecture 91 The OSI Model (OBJ 3.3 & 3.6)

Lecture 92 Switches (OBJ 1.4 & 2.7)

Lecture 93 Routers (OBJ 3.3)

Lecture 94 Network Zones (OBJ 3.3)

Lecture 95 ** Jumpbox (OBJ 3.5)

Lecture 96 Network Access Control (OBJ 3.3 & 4.4)

Lecture 97 VLANs (OBJ 3.3)

Lecture 98 Subnetting (OBJ 3.6)

Lecture 99 Network Address Translation (OBJ 3.3)

Lecture 100 Telephony (OBJ 3.1)

Section 12: Perimeter Security

Lecture 101 Perimeter Security

Lecture 102 Firewalls (OBJ 3.3 & 4.4)

Lecture 103 Demo: SOHO Firewall (OBJ 3.3 & 4.4)

Lecture 104 Proxy Servers (OBJ 3.3 & 4.4)

Lecture 105 Honeypots and Honeynets (OBJ 2.1)

Lecture 106 Data Loss Prevention (OBJ 2.1, 3.2, & 4.4)

Lecture 107 NIDS and NIPS (OBJ 3.3)

Lecture 108 Unified Threat Management (OBJ 3.2 & 3.3)

Section 13: Cloud Security

Lecture 109 Cloud Computing (OBJ 1.5, 2.2, 3.5, & 3.6)

Lecture 110 Cloud Types (OBJ 2.2 & 3.6)

Lecture 111 As a Service (OBJ 2.2)

Lecture 112 Cloud Security (OBJ 2.5 & 3.6)

Lecture 113 Defending Servers (OBJ 1.7, 3.1, and 3.2)

Lecture 114 Cloud-based Infrastructure (OBJ 1.2, 1.6, 2.2, 2.4, 2.5, & 3.6)

Lecture 115 CASB (OBJ 2.1)

Lecture 116 API (OBJ 2.1)

Lecture 117 FAAS and Serverless (OBJ 2.2)

Lecture 118 Cloud Threats (OBJ 1.3, 1.6, 2.1, & 2.2)

Section 14: Automation

Lecture 119 Workflow Orchestration (OBJ 2.3)

Lecture 120 CI/CD (OBJ 2.3)

Lecture 121 DevSecOps (OBJ 2.3)

Lecture 122 IAC (OBJ 2.2)

Lecture 123 Machine Learning (OBJ 1.2)

Section 15: Network Attacks

Lecture 124 Network Attacks (OBJ 1.4)

Lecture 125 Ports and Protocols (OBJ 3.1)

Lecture 126 Memorization of Ports (OBJ 3.1)

Lecture 127 Unnecessary Ports (OBJ 1.6 & 3.2)

Lecture 128 Denial of Service (OBJ 1.3 & 1.4)

Lecture 129 DDoS (OBJ 1.2, 1.3, & 1.4)

Lecture 130 Stopping a DDoS (OBJ 2.1 & 2.3)

Lecture 131 Spoofing (OBJ 1.4 & 3.3)

Lecture 132 Hijacking (OBJ 1.3 & 1.4)

Lecture 133 Replay Attack (OBJ 1.3)

Lecture 134 Demo: Null Sessions (OBJ 1.6)

Lecture 135 Transitive Attacks (OBJ 2.4)

Lecture 136 DNS Attacks (OBJ 1.1, 1.4 & 3.1)

Lecture 137 ARP Poisoning (OBJ 1.4)

Section 16: Securing Networks

Lecture 138 Securing Networks (OBJ 3.3)

Lecture 139 Securing Network Devices (OBJ 1.2, 1.6, 3.3, & 3.7)

Lecture 140 Securing Network Media (OBJ 2.7)

Lecture 141 Securing WiFi Devices (OBJ 1.4 & 3.4)

Lecture 142 Wireless Encryption (OBJ 1.6 & 3.4)

Lecture 143 Wireless Access Points (OBJ 1.4 & 3.4)

Lecture 144 Wireless Attacks (OBJ 1.2, 1.4 & 1.8)

Lecture 145 Demo: Wireless Attack (OBJ 1.4)

Lecture 146 WPA3 (OBJ 3.4)

Lecture 147 Other Wireless Technologies (OBJ 1.4 & 3.5)

Section 17: Physical Security

Lecture 148 Physical Security (OBJ 2.7)

Lecture 149 Surveillance (OBJ 2.7)

Lecture 150 Door Locks (OBJ 2.7)

Lecture 151 Demo: Lock Picking (OBJ 2.7)

Lecture 152 Biometric Readers (OBJ 2.4)

Section 18: Facilities Security

Lecture 153 Facilities Security (OBJ 2.7)

Lecture 154 Fire Suppression (OBJ 2.7)

Lecture 155 HVAC (OBJ 2.5, 2.6, & 2.7)

Lecture 156 Shielding (OBJ 2.7)

Lecture 157 Vehicular Vulnerabilities (OBJ 2.6 & 2.7)

Lecture 158 IoT Vulnerabilities (OBJ 2.6)

Lecture 159 Embedded System Vulnerabilities (OBJ 2.6)

Lecture 160 ICS and SCADA Vulnerabilities (OBJ 2.6)

Lecture 161 Mitigating Vulnerabilities (OBJ 2.6)

Lecture 162 Premise System Vulnerabilities (OBJ 1.2, 1.3, 1.7, & 2.6)

Section 19: Authentication

Lecture 163 Authentication (OBJ 2.4, 3.5, & 3.8)

Lecture 164 Authentication Models (OBJ 2.4, 3.5, 3.8, & 3.9)

Lecture 165 802.1x (OBJ 3.4 & 3.8)

Lecture 166 LDAP and Kerberos (OBJ 3.1 & 3.8)

Lecture 167 Remote Desktop Services (OBJ 3.1)

Lecture 168 Remote Access Service (OBJ 3.1 & 3.8)

Lecture 169 VPN (OBJ 3.3)

Lecture 170 RADIUS vs TACACS+ (OBJ 3.8)

Lecture 171 Authentication Summary (OBJ 3.8)

Lecture 172 Authentication Attacks (OBJ 1.2)

Section 20: Access Control

Lecture 173 Access Control (OBJ 3.8)

Lecture 174 Access Control Models (OBJ 3.8)

Lecture 175 Best Practices (OBJ 2.7, 3.8, & 5.3)

Lecture 176 Users and Groups (OBJ 3.7 & 3.8)

Lecture 177 Permissions (OBJ 3.8)

Lecture 178 Usernames and Passwords (OBJ 1.6 & 3.7)

Lecture 179 Demo: Policies (OBJ 3.7)

Lecture 180 User Account Control (OBJ 3.7 & 3.8)

Section 21: Risk Assessments

Lecture 181 Risk Assessments (OBJ 5.4)

Lecture 182 Qualitative Risk (OBJ 5.4)

Lecture 183 Quantitative Risk (OBJ 5.4)

Lecture 184 Methodologies (OBJ 1.7 & 5.4)

Lecture 185 Security Controls (OBJ 5.1)

Lecture 186 Types of Risk (OBJ 1.6 & 5.4)

Section 22: Vulnerability Management

Lecture 187 Vulnerability Management (OBJ 1.7, 4.1, & 5.4)

Lecture 188 Penetration Testing (OBJ 1.8)

Lecture 189 Training and Exercises (OBJ 1.8 & 4.2)

Lecture 190 OVAL (OBJ 1.7)

Lecture 191 Vulnerability Assessments (OBJ 1.7 & 4.1)

Lecture 192 Demo: Nmap Scanning (OBJ 4.1)

Lecture 193 Demo: Vulnerability Scanning (OBJ 1.7, 4.1, & 4.3)

Lecture 194 Password Analysis (OBJ 1.2)

Lecture 195 Demo: Password Cracking (OBJ 4.1)

Section 23: Monitoring and Auditing

Lecture 196 Monitoring Types (OBJ 3.3)

Lecture 197 Performance Baselining (OBJ 2.1)

Lecture 198 Protocol Analyzers (OBJ 3.3 & 4.1)

Lecture 199 SNMP (OBJ 3.1)

Lecture 200 Demo: Analytical Tools (OBJ 4.1)

Lecture 201 Auditing (OBJ 1.7)

Lecture 202 Demo: Auditing Files (OBJ 1.7)

Lecture 203 Logging (OBJ 1.7, 4.3, & 4.5)

Lecture 204 Log Files (OBJ 4.3)

Lecture 205 SIEM (OBJ 1.7 & 4.3)

Lecture 206 Syslog (OBJ 1.7 & 4.3)

Lecture 207 SOAR (OBJ 1.7 & 4.4)

Section 24: Cryptography

Lecture 208 Cryptography (OBJ 2.1 & 2.8)

Lecture 209 Symmetric vs Asymmetric (OBJ 2.8)

Lecture 210 Symmetric Algorithms (OBJ 2.8)

Lecture 211 Public Key Cryptography (OBJ 2.8)

Lecture 212 Asymmetric Algorithms (OBJ 2.8)

Lecture 213 Pretty Good Privacy (OBJ 2.8)

Lecture 214 Key Management (OBJ 2.8)

Lecture 215 One-Time Pad (OBJ 2.8)

Lecture 216 Demo: Steganography (OBJ 2.8)

Lecture 217 Cryptography Considerations (OBJ 2.8)

Section 25: Hashing

Lecture 218 Hashing (OBJ 1.2, 2.8 & 3.2)

Lecture 219 Demo: Hashing (OBJ 2.8)

Lecture 220 Hashing Attacks (OBJ 1.2,1.3, & 2.8)

Lecture 221 Increasing Hash Security (OBJ 2.8 & 3.7)

Section 26: Public Key Infrastructure

Lecture 222 Public Key Infrastructure (OBJ 3.1, 3.3, & 3.9)

Lecture 223 Digital Certificates (OBJ 3.9)

Lecture 224 Demo: Certificates (OBJ 2.8 & 3.9)

Lecture 225 Certificate Authorities (OBJ 3.2 & 3.9)

Lecture 226 Web of Trust (OBJ 3.9)

Section 27: Security Protocols

Lecture 227 Security Protocols (OBJ 3.1)

Lecture 228 S/MIME (OBJ 3.1)

Lecture 229 SSL and TLS (OBJ 1.2, 2.1, 3.1, & 3.3)

Lecture 230 SSH (OBJ 3.1 & 4.1)

Lecture 231 VPN Protocols (OBJ 3.1 & 3..3)

Lecture 232 Demo: Setting up a VPN (OBJ 3.3)

Section 28: Planning for the Worst

Lecture 233 Planning for the Worst (OBJ 2.5 & 5.4)

Lecture 234 Redundant Power (OBJ 2.5)

Lecture 235 Backup Power (OBJ 2.5)

Lecture 236 Data Redundancy (OBJ 2.5)

Lecture 237 Demo: RAIDs (OBJ 2.5)

Lecture 238 Network Redundancy (OBJ 2.5)

Lecture 239 Server Redundancy (OBJ 2.5 &3.3)

Lecture 240 Redundant Sites (OBJ 2.1)

Lecture 241 Data Backup (OBJ 2.5)

Lecture 242 Tape Rotation (OBJ 2.5)

Lecture 243 Disaster Recovery Plan (OBJ 2.1, 2.5, 4.2, & 5.4)

Lecture 244 Business Impact Analysis (OBJ 5.4)

Section 29: Social Engineering

Lecture 245 Social Engineering (OBJ 1.1)

Lecture 246 Demo: Pretexting (OBJ 1.1 & 5.3)

Lecture 247 Insider Threat (OBJ 1.5)

Lecture 248 Phishing (OBJ 1.1 & 5.3)

Lecture 249 Motivation Factors (OBJ 1.1)

Lecture 250 More Social Engineering (OBJ 1.1 & 1.2)

Lecture 251 Fraud and Scams (OBJ 1.1)

Lecture 252 Influence Campaigns (OBJ 1.1)

Lecture 253 User Education (OBJ 5.3)

Section 30: Policies and Procedures

Lecture 254 Policies and Procedures (OBJ 5.2 & 5.3)

Lecture 255 Data Classifications (OBJ 5.3 & 5.5)

Lecture 256 Data Ownership

Lecture 257 PII and PHI (OBJ 5.2 & 5.5)

Lecture 258 Legal Requirements (OBJ 5.2 & 5.5)

Lecture 259 Privacy Technologies (OBJ 5.5)

Lecture 260 Security Policies (OBJ 5.3 & 5.5)

Lecture 261 User Education (OBJ 5.3)

Lecture 262 Vendor Relationships (OBJ 5.3)

Lecture 263 Disposal Policies (OBJ 2.7 & 4.1)

Lecture 264 IT Security Frameworks (OBJ 5.2)

Lecture 265 Key Frameworks (OBJ 5.2)

Section 31: Incident Response and Forensics

Lecture 266 Incident Response Procedures (OBJ 4.2)

Lecture 267 Incident Response Planning (OBJ 4.2)

Lecture 268 Investigative Data (OBJ 4.3)

Lecture 269 Forensic Procedures (OBJ 4.5)

Lecture 270 Data Collection Procedures (OBJ 4.1 & 4.5)

Lecture 271 Demo: Disk Imaging (OBJ 4.1)

Lecture 272 Security Tools (OBJ 4.1)

Section 32: Conclusion

Lecture 273 Conclusion

Lecture 274 BONUS: What's Next?

Section 33: Practice Exam

Students wanting to pass the CompTIA Security+ certification exam,Students wanting to learn the terminology and nomenclature of computer security,Students seeking a career in cyber security