Tags
Language
Tags
May 2025
Su Mo Tu We Th Fr Sa
27 28 29 30 1 2 3
4 5 6 7 8 9 10
11 12 13 14 15 16 17
18 19 20 21 22 23 24
25 26 27 28 29 30 31
    Attention❗ To save your time, in order to download anything on this site, you must be registered 👉 HERE. If you do not have a registration yet, it is better to do it right away. ✌

    ( • )( • ) ( ͡⚆ ͜ʖ ͡⚆ ) (‿ˠ‿)
    SpicyMags.xyz

    Comptia Security+ Sy0-701 With Cloud And Data Center

    Posted By: ELK1nG
    Comptia Security+ Sy0-701 With Cloud And Data Center

    Comptia Security+ Sy0-701 With Cloud And Data Center
    Published 4/2024
    MP4 | Video: h264, 1920x1080 | Audio: AAC, 44.1 KHz
    Language: English | Size: 7.15 GB | Duration: 15h 31m

    Prepare for CompTIA Security+ SY0-701 and Explore Cisco, F5, Linux, and AWS Technologies.

    What you'll learn

    Cyber Security Basics

    Network Fundamentals

    Network and Security Appliance

    Malicious Software (Malware)

    Common Network Attacks

    Common Application Attacks

    Requirements

    Computer Basics

    Network Basics

    Description

    Welcome to 'CompTIA Security+ SY0-701 with Cloud and Data Center,' your comprehensive guide to mastering cybersecurity fundamentals and exploring advanced technologies in cloud and data center environments.In this course, you'll embark on a structured journey through essential topics, beginning with an Introduction to set the stage for your learning experience. Then, dive into hands-on lab exercises specifically tailored to the CompTIA Security+ SY0-701 exam, allowing you to reinforce your understanding of key concepts in a practical setting.Explore Security Basics, Network Fundamentals, and Network Security Solutions to build a solid foundation in cybersecurity principles. Discover Network and Application Use Cases, Wireless Security, and Endpoint Security to understand real-world scenarios and solutions.Then, venture into Cloud Security and Identity and Access Management (IAM) to grasp the complexities of securing cloud environments. Learn about Threats, Vulnerabilities, and Attacks, as well as Advanced Attacks and Attack Mitigation Use Cases, to prepare for sophisticated cyber threats.Throughout the course, engage in whiteboarding discussions and lab demonstrations to deepen your understanding and practical skills. By the end, you'll have explored Cisco, F5, Linux, and AWS Technologies, and be equipped with the knowledge and tools to navigate the Security+ SY0-701 exam and succeed in today's dynamic cybersecurity landscape. Join us on this journey to cybersecurity mastery!

    Overview

    Section 1: Introduction

    Lecture 1 Course Introduction

    Lecture 2 About the Course

    Lecture 3 About the Instructor

    Lecture 4 Motivation

    Lecture 5 Course Flow

    Lecture 6 Updates

    Section 2: CompTIA Security+ SY0-701 Lab

    Lecture 7 CompTIA Security+ SY0-701 Lab Overview

    Lecture 8 Security+ Lab Guides

    Section 3: Security Basics

    Lecture 9 Security Basics Overview

    Lecture 10 CIA Triage

    Lecture 11 Confidentiality

    Lecture 12 Integrity

    Lecture 13 Availability

    Lecture 14 Risk and Security Controls

    Lecture 15 Managerial Controls

    Lecture 16 Operational Controls

    Lecture 17 Technical Controls

    Lecture 18 Preventive Controls

    Lecture 19 Detective Controls

    Lecture 20 Corrective and Recovery Controls

    Lecture 21 Deterrent Controls

    Lecture 22 Compensating Controls

    Lecture 23 Response Controls

    Section 4: Network Fundamentals (Cisco Switches, Cisco Routers)

    Lecture 24 Network Fundamentals Overview

    Lecture 25 Connectivity Basics

    Lecture 26 MAC Learning

    Lecture 27 Intranet vs Extranet

    Lecture 28 OSI Model

    Lecture 29 Demo 1 - MAC Address

    Lecture 30 IP Addressing

    Lecture 31 Subnetting

    Lecture 32 TCP/IP Model

    Lecture 33 Point to point networks

    Lecture 34 Netmask

    Lecture 35 Routed Ports

    Lecture 36 Demo 2 - IP Adressing

    Lecture 37 IPv4 vs IPv6

    Lecture 38 UDP

    Lecture 39 TCP

    Lecture 40 Virtual LAN (VLAN)

    Lecture 41 802.1Q

    Lecture 42 Default Gateway

    Lecture 43 Inter VLAN Communication

    Lecture 44 Network Segmentation

    Lecture 45 Demo 3 - VLANs

    Lecture 46 Routing

    Lecture 47 Static Routes

    Lecture 48 NAT

    Lecture 49 Demo 4 - Routing

    Lecture 50 Zero Trust

    Section 5: Network and Application Use Cases

    Lecture 51 Network and Application Use Cases Overview

    Lecture 52 TCP and UDP Applications

    Lecture 53 Active FTP

    Lecture 54 Passive FTP

    Lecture 55 Demo 1 - FTP and TFTP

    Lecture 56 Email

    Lecture 57 Web - HTTP Basics

    Lecture 58 Web - HTTP Connections

    Lecture 59 Web - Development Stack

    Lecture 60 Demo 2 - Web

    Lecture 61 Telnet

    Lecture 62 SSH

    Lecture 63 Demo 3 - Telnet and SSH

    Lecture 64 NTP

    Lecture 65 Dynamic Host Configuration Protocol (DHCP)

    Lecture 66 Demo 4 - DHCP and DNS

    Section 6: Network Security Solutions

    Lecture 67 Network and Security Solutions Overview

    Lecture 68 Ethernet Switches

    Lecture 69 Securing Switches with Port Security

    Lecture 70 Securing Switches with DHCP Snooping

    Lecture 71 Demo 1 - Securing Ethernet Switches

    Lecture 72 Routers

    Lecture 73 Securing Routers with ACL

    Lecture 74 Router ACL in Action

    Lecture 75 Demo 2 - Securing Routers

    Lecture 76 Firewalls

    Lecture 77 Stateless Firewall

    Lecture 78 Stateful Firewall

    Lecture 79 Demo 3 - Stateless vs Stateful Firewalls

    Lecture 80 IPS

    Lecture 81 IDS

    Lecture 82 Cisco Firepower Basics

    Lecture 83 Cisco Firepower Malware Protection

    Lecture 84 Demo 4 - Cisco Firepower Basics

    Lecture 85 Demo 5 - Cisco Firepower Configuration

    Lecture 86 Forwarding Proxy

    Lecture 87 Reverse Proxy

    Lecture 88 Load Balancer

    Lecture 89 F5 BIG-IP Basics

    Lecture 90 Demo 6 - F5 BIG-IP Basics

    Lecture 91 Web Application Firewall (WAF)

    Lecture 92 F5 BIG-IP ASM/WAF Basics

    Lecture 93 Demo 7 - F5 BIG-IP ASM/WAF Basics

    Lecture 94 SD-WAN

    Section 7: Network Security Use Cases (Cisco Switches, Routers Firewalls)

    Lecture 95 Network Security Overview

    Lecture 96 Demo 1 - Cisco Firepower NGFW vs NGIPS

    Lecture 97 Switch Loop Prevention

    Lecture 98 Securing Switch Loop Prevention

    Lecture 99 Demo 2 - Securing Switch Loop Prevention

    Lecture 100 VPN Basics

    Lecture 101 Site-Site VPN

    Lecture 102 Demo 3- Site-Site VPN

    Lecture 103 Remote Access VPN

    Lecture 104 SSL/TLS VPN

    Lecture 105 Split Tunnel vs Full Tunnel

    Lecture 106 Other Tunnels and VPNs

    Lecture 107 Demo 4 - Remote Access VPN

    Lecture 108 802.1X

    Lecture 109 AAA Server

    Lecture 110 Network Access Control (NAC)

    Lecture 111 NAC Health Checks

    Lecture 112 AAA-enabled NAC

    Lecture 113 Remote VPN AAA

    Lecture 114 Demo 5 - Remote VPN AAA

    Section 8: Wireless Security

    Lecture 115 Wireless Security Overview

    Lecture 116 Wireless Basics

    Lecture 117 Wireless SSID

    Lecture 118 Wireless Solutions

    Lecture 119 Demo 1 - Wireless Solutions

    Lecture 120 Wireless Authentication

    Lecture 121 Captive Portal

    Section 9: Network and Security Command-Line Tools (Linux)

    Lecture 122 Network and Security Command-Line Tools Overview

    Lecture 123 Linux Basics

    Lecture 124 Basic Linux Commands

    Lecture 125 Demo 1 - Basic Linux Commands

    Lecture 126 Linux Network Tools

    Lecture 127 Demo 2 - Linux Network Tools

    Lecture 128 Common Linux Services

    Lecture 129 Reconnaissance and Discovery

    Lecture 130 Demo 3 - Reconnaissance and Discovery

    Lecture 131 Linux Web Dev Stack

    Lecture 132 Linux File System

    Lecture 133 Centralized Logging

    Section 10: Endpoint Security

    Lecture 134 Endpoint Security Overview

    Lecture 135 Virtualization

    Lecture 136 Hypervisors

    Lecture 137 Virtualization Features

    Lecture 138 VMs vs Containers

    Lecture 139 Containerization

    Lecture 140 Protecting Host Data

    Lecture 141 Securing Internet of Things (IoT)

    Lecture 142 Securing Embedded System

    Section 11: Cloud Security

    Lecture 143 Cloud Security Overview

    Lecture 144 Cloud Computing Basics

    Lecture 145 Cloud Deployment Models

    Lecture 146 Cloud Security Controls

    Lecture 147 Cloud Components

    Lecture 148 Hybrid Cloud

    Lecture 149 Cloud Security Organizations

    Lecture 150 AWS Basics

    Lecture 151 AWS Instances

    Lecture 152 AWS Infrastructure

    Lecture 153 Demo 1 - AWS Account Creation

    Lecture 154 AWS Network Access Control List (NACL)

    Lecture 155 AWS Security Groups

    Lecture 156 Demo 2 - AWS EC2

    Lecture 157 AWS Load Balancer

    Lecture 158 Demo 3 - AWS ELB

    Lecture 159 AWS Web Application Firewall

    Lecture 160 Demo 4 - AWS WAF

    Lecture 161 Demo 5 - AWS Threat Detection

    Section 12: Identity and Access Management (IAM)

    Lecture 162 Identity and Access Management (IAM) Overview

    Lecture 163 Identification and AAA

    Lecture 164 Something you know

    Lecture 165 Something you have

    Lecture 166 Something you are

    Lecture 167 2FA and MFA

    Lecture 168 Managing Accounts

    Lecture 169 Authentication Services

    Lecture 170 Role Based Access Control (RBAC)

    Lecture 171 Access Control Scheme

    Lecture 172 Demo - AWS User Creation

    Lecture 173 AWS Password Policy

    Lecture 174 Demo - AWS Password Policy

    Lecture 175 Demo - AWS RBAC

    Lecture 176 Demo - AWS MFA

    Section 13: Threats, Vulnerabilities and Attacks

    Lecture 177 Threats vs Vulnerabilities and Attacks Overview

    Lecture 178 Threat Actors

    Lecture 179 Malware

    Lecture 180 Types of Malware

    Lecture 181 Ransomware and Cryptomalware

    Lecture 182 Social Engineering

    Lecture 183 Effectiveness of Social Engineering

    Lecture 184 Email Attack

    Lecture 185 Phone Attack

    Section 14: Advanced Attacks

    Lecture 186 Advanced Attacks Overview

    Lecture 187 Cyber Kill Chain

    Lecture 188 Cyber Kill Chain in Action

    Lecture 189 Network Attacks

    Lecture 190 OWASP

    Lecture 191 Web Application Attacks

    Lecture 192 Secure Coding on Web Vulnerabilities

    Lecture 193 Advanced Web Application Attacks

    Lecture 194 Secure Coding on Advanced Web Vulnerabilities

    Section 15: Security Risks

    Lecture 195 Security Risks Overview

    Lecture 196 Risk Management

    Lecture 197 Frameworks and Standards

    Lecture 198 Threat Hunting

    Lecture 199 Bug Bounty

    Lecture 200 Bug Bounty in Action

    Section 16: Security Controls

    Lecture 201 Security Controls Overview

    Lecture 202 Doors and Locks

    Lecture 203 Physical Attacks

    Lecture 204 Redundancy and Fault Tolerance

    Lecture 205 Server Redundancy

    Lecture 206 Network Redundancy

    Section 17: Security Policies

    Lecture 207 Security Policies Overview

    Lecture 208 Corporate Security Policies

    Lecture 209 Incident Response Policies

    Lecture 210 Data Governance

    Lecture 211 Security Training

    Lecture 212 Security Awareness

    Section 18: Completion

    Lecture 213 Wrap Up

    Lecture 214 Moving On

    Lecture 215 Message from the Instructor

    Lecture 216 Course Completion

    Those who are preparing CompTIA Security+ Exam,Those who want to learn Cyber Security in General,CCNA who wants to learn Security and planning to go for CCNP Security