Tags
Language
Tags
May 2025
Su Mo Tu We Th Fr Sa
27 28 29 30 1 2 3
4 5 6 7 8 9 10
11 12 13 14 15 16 17
18 19 20 21 22 23 24
25 26 27 28 29 30 31
    Attention❗ To save your time, in order to download anything on this site, you must be registered 👉 HERE. If you do not have a registration yet, it is better to do it right away. ✌

    ( • )( • ) ( ͡⚆ ͜ʖ ͡⚆ ) (‿ˠ‿)
    SpicyMags.xyz

    Comptia Security+ (Sy0-701) Practical Skills

    Posted By: ELK1nG
    Comptia Security+ (Sy0-701) Practical Skills

    Comptia Security+ (Sy0-701) Practical Skills
    Published 5/2024
    MP4 | Video: h264, 1920x1080 | Audio: AAC, 44.1 KHz
    Language: English | Size: 6.40 GB | Duration: 12h 13m

    CompTIA Security+ (SY0-701) practical skills

    What you'll learn

    Security Concept Fundamentals

    Threat Vectors and Attack Surfaces, Analyze Malicious Activity, Mitigation Techniques

    Identifying Security Vulnerabilities, Security Architecture Models

    Securing Enterprise Infrastructures, Data Protection Strategies

    Resilience in Security Architecture, Securing Computing Resources

    Asset Management Techniques, Vulnerability Management

    Monitoring Computing Resources, Investigative Data Sources

    Implementation of Automation & Orchestration for Security Operations

    Requirements

    Basic Networking Foundation Knowledge, Basic Foundation of Linux Systems

    Description

    Welcome to the Security+ (SY0-701) Practical Skills course. Upon completion of this course, you will have acquired hands-on experience in analyzing a network infrastructure for potential security vulnerabilities and implementing remediation strategies for these vulnerabilities.Through the completion of the modules, you will enhance your practical skills in identifying and fortifying a network infrastructure against cyber security threats. These modules are designed to align with the practical objectives and competencies outlined in the CompTIA Security+ certification exam (SY0-701).The CompTIA Security+ (SY0-701) exam serves as an entry-level cyber security certification, targeting IT security analysts, vulnerability analysts, threat intelligence analysts, or IT professionals aspiring to enter the industry.The content of this course emphasizes the practical aspects of the exam objectives. No prior hands-on experience is necessary to utilize or complete this Practice Lab. However, a foundational understanding of IT networking and basic Linux concepts is preferred to facilitate comprehension of the course content and labs.Throughout this course, we will utilize JSS labs. However, students are welcome to utilize home-based labs such as VirtualBox or other virtualization technologies. We will provide a video tutorial demonstrating a similar setup to our JSS labs, enabling you to replicate it should you choose to utilize home-based labs.

    Overview

    Section 1: Introduction

    Lecture 1 Introduction

    Lecture 2 Free 10 Days Practice Exam Information

    Lecture 3 Quick Prerequisite or Expectation Check

    Lecture 4 Build a Sec+ Home Lab

    Section 2: Security Concept Fundamentals

    Lecture 5 Trainer Knowledge Share Video

    Lecture 6 Introduction - Security Concept Fundamentals

    Lecture 7 Exercise 1 - Configure RAID 1

    Lecture 8 Exercise 2 - Configure and Test File Integrity Monitoring

    Lecture 9 Interview Questions & Answers

    Section 3: Cryptographic Solutions

    Lecture 10 Introduction - Cryptographic Solutions

    Lecture 11 Exercise 1 - Create and Verify a Digital Signature

    Lecture 12 Exercise 2 - Create and Approve a Certificate Signing Request

    Lecture 13 Interview Questions and Answers

    Section 4: Threat Vectors and Attack Surfaces

    Lecture 14 Trainer Knowledge Share Video

    Lecture 15 Introduction - Threat Vectors and Attack Surfaces

    Lecture 16 Exercise 1 - Open Service Ports

    Lecture 17 Exercise 2 - Default Credentials

    Lecture 18 Exercise 3 - Vulnerable Applications

    Lecture 19 Interview Questions and Answers

    Section 5: Identifying Security Vulnerabilities

    Lecture 20 Trainer Knowledge Share Video

    Lecture 21 Introduction - Identifying Security Vulnerabilities

    Lecture 22 Exercise 1 - Identify LM Hash Vulnerabilities

    Lecture 23 Exercise 2 - Identify DNS Transfer Vulnerabilities

    Lecture 24 Interview Questions and Answers

    Section 6: Analyze Malicious Activity

    Lecture 25 Trainer Knowledge Share Video

    Lecture 26 Introduction - Analyze Malicious Activity

    Lecture 27 Exercise 1 - Observe Indications of a Brute Force Attack

    Lecture 28 Exercise 3 - Observe Indications of a SYN Flood Attack

    Lecture 29 Interview Questions and Answers

    Section 7: Mitigation Techniques

    Lecture 30 Trainer Knowledge Share Video

    Lecture 31 Introduction - Mitigation Techniques

    Lecture 32 Exercise 1 - Configure Router Access

    Lecture 33 Exercise 2 - Harden Router Access

    Lecture 34 Exercise 3 - Configure Router Logging

    Section 8: Security Architecture Models

    Lecture 35 Trainer Knowledge Share Video

    Lecture 36 Introduction Security Architecture Models

    Lecture 37 Exercise 1 - Create a VM

    Lecture 38 Exercise 2 - Use Containers

    Lecture 39 Exercise 3 - Complete VM Deployment

    Section 9: Securing Enterprise Infrastructures

    Lecture 40 Trainer Knowledge Share Video

    Lecture 41 Introduction Securing Enterprise Infrastructures

    Lecture 42 Exercise 1 - Install and Configure a VPN Server

    Lecture 43 Exercise 2 - Create a VPN User and Client

    Lecture 44 Exercise 3 - Configure a L2TP/IPsec VPN

    Lecture 45 Interview Questions and Answers

    Section 10: Data Protection Strategies

    Lecture 46 Trainer Knowledge Share Video

    Lecture 47 Introduction Data Protection Strategies

    Lecture 48 Exercise 1 - Encryption

    Lecture 49 Exercise 2 - Hashing

    Lecture 50 Exercise 3 - Obfuscation

    Lecture 51 Interview Questions and Answers

    Section 11: Resilience in Security Architecture

    Lecture 52 Trainer Knowledge Share Video

    Lecture 53 Introduction Resilience in Security Architecture

    Lecture 54 Exercise 1 - Prepare WIN11 and Install EaseUS Todo Backup

    Lecture 55 Exercise 2 - Conduct and Restore from Incremental Backups

    Lecture 56 Exercise 3 - Conduct Differential Backups and Examine all Backup Files

    Lecture 57 Exercise 4 - Investigate the Archive Bit

    Section 12: Securing Computing Resources

    Lecture 58 Trainer Knowledge Share Video

    Lecture 59 Introduction Securing Computing Resources

    Lecture 60 Exercise 1 - Establish a Baseline

    Lecture 61 Exercise 2 - Input Validation

    Lecture 62 Exercise 3 - Sandboxing

    Section 13: Asset Management Techniques

    Lecture 63 Trainer Knowledge Share Video

    Lecture 64 Introduction - Asset Management Techniques

    Lecture 65 Exercise 1 - Deploy an Asset and License

    Lecture 66 Exercise 2 - Secure Data Sanitization

    Section 14: Vulnerability Management

    Lecture 67 Introduction - Vulnerability Management

    Lecture 68 Trainer Knowledge Share Video

    Lecture 69 Exercise 1 - Detect Web Application Vulnerabilities

    Lecture 70 Exercise 2 - Monitor Devices for Vulnerabilities

    Lecture 71 Interview Questions and Answers

    Lecture 72 Information Tips

    Lecture 73 Security Assessments and Tools Lecture

    Lecture 74 Conduct a Software Vulnerability Scan Using AlienVault

    Lecture 75 Conduct a Software Vulnerability Scan using Nessus

    Lecture 76 Review a Template Incident Response Documentation

    Section 15: Monitoring Computing Resources

    Lecture 77 Introduction - Monitoring Computing Resources

    Lecture 78 Exercise 1 - Monitoring Device Resource Utilization

    Lecture 79 Interview Questions and Answers

    Section 16: Enhancing Enterprise Security

    Lecture 80 Trainer Knowledge Share Video

    Lecture 81 Introduction Enhancing Enterprise Security

    Lecture 82 Exercise 1 - Linux Server Hardening Techniques

    Lecture 83 Exercise 2 - Windows Server Hardening Techniques

    Section 17: Implement Identity & Access Management

    Lecture 84 Trainer Knowledge Share Video

    Lecture 85 Introduction Implement Identity & Access Management

    Lecture 86 Exercise 1 - Provisioning User Accounts on a Microsoft Server

    Lecture 87 Exercise 2 - Provisioning User Accounts on a Linux Server

    Section 18: Implementation of Automation & Orchestration for Security Operations

    Lecture 88 Trainer Knowledge Share Video

    Lecture 89 Introduction Implementation of Automation & Orchestration for Security Operation

    Lecture 90 Exercise 1 - Creating Automation Scripts

    Section 19: Investigative Data Sources

    Lecture 91 Trainer Knowledge Share Video

    Lecture 92 Introduction Investigative Data Sources

    Lecture 93 Exercise 1 - Log File Analysis

    Section 20: Cloud and Security

    Lecture 94 Information Tips

    Lecture 95 Introductory Lecture: Securing Cloud Infrastructure Resources

    Lecture 96 Encrypt an Azure VM OS and Data Disks

    Lecture 97 Investigating AWS Artifact

    Lecture 98 Security Groups in AWS

    Lecture 99 Next Course to take

    Lecture 100 Bonus Lecture

    This course is designed for IT professionals looking to transition into cybersecurity in order to learn the technical skills and gain confidence,New Cybersecurity Analyst