| Section 01: Introduction | |||
| Promo | 00:01:00 | ||
| Introduction to CompTIA Security+ SY0-601 | 00:03:00 | ||
| About the CompTIA Security+ SY0-601 Exam | 00:03:00 | ||
| Resource – CompTIA Security+ SY0-601 Exam Objectives | 00:05:00 | ||
| Section 02: Risk Management | |||
| Defining Risk | 00:08:00 | ||
| Threats and Vulnerabilities | 00:07:00 | ||
| Threat Intelligence | 00:11:00 | ||
| Risk Management Concepts | 00:07:00 | ||
| Security Controls | 00:09:00 | ||
| Risk Assessments and Treatments | 00:06:00 | ||
| Quantitative Risk Assessments | 00:07:00 | ||
| Qualitative Risk Assessments | 00:04:00 | ||
| Business Impact Analysis | 00:09:00 | ||
| Data Types and Roles | 00:11:00 | ||
| Security and the Information Life Cycle | 00:09:00 | ||
| Data Destruction | 00:06:00 | ||
| Personnel Risk and Policies | 00:10:00 | ||
| Third-Party Risk Management | 00:09:00 | ||
| Agreement Types | 00:07:00 | ||
| Exam Question Review | 00:02:00 | ||
| Wiping Disks with the dd Command Lab | 00:06:00 | ||
| Ask Me Anything (AMA) | 00:02:00 | ||
| Handouts | 00:05:00 | ||
| Lab Handouts | 00:05:00 | ||
| Section 03: Cryptography | |||
| Cryptography Basics | 00:16:00 | ||
| Data Protection | 00:09:00 | ||
| Cryptographic Methods | 00:07:00 | ||
| Symmetric Cryptosystems | 00:13:00 | ||
| Symmetric Block Modes | 00:08:00 | ||
| Asymmetric Cryptosystems | 00:13:00 | ||
| Diffie-Hellman | 00:07:00 | ||
| Hashing | 00:09:00 | ||
| Understanding Digital Certificates | 00:08:00 | ||
| Trust Models | 00:05:00 | ||
| Public Key Infrastructure | 00:04:00 | ||
| Certificate Types | 00:14:00 | ||
| Touring Certificates | 00:09:00 | ||
| Cryptographic Attacks | 00:05:00 | ||
| Password Cracking | 00:10:00 | ||
| Password Cracking Demo | 00:06:00 | ||
| Exam Question Review | 00:02:00 | ||
| SSH Public Key Authentication Lab | 00:09:00 | ||
| Ask Me Anything (AMA) | 00:02:00 | ||
| Handouts | 00:05:00 | ||
| Lab Handouts | 00:05:00 | ||
| Section 04: Identity and Account Management | |||
| Identification, Authentication, and Authorization | 00:08:00 | ||
| Enabling Multifactor Authentication | 00:05:00 | ||
| Authorization | 00:05:00 | ||
| Accounting | 00:05:00 | ||
| Authentication Methods | 00:14:00 | ||
| Access Control Schemes | 00:07:00 | ||
| Account Management | 00:13:00 | ||
| Network Authentication | 00:09:00 | ||
| Identity Management Systems | 00:06:00 | ||
| Exam Question Review | 00:02:00 | ||
| Creating LInux Users and Groups Lab | 00:06:00 | ||
| Ask Me Anything (AMA) | 00:01:00 | ||
| Handouts | 00:05:00 | ||
| Lab Handouts | 00:05:00 | ||
| Section 05: Tools of the Trade | |||
| Touring the CLI | 00:16:00 | ||
| Shells | 00:06:00 | ||
| The Windows Command Line | 00:05:00 | ||
| Microsoft PowerShell | 00:13:00 | ||
| Linux Shells | 00:12:00 | ||
| Python Scripts | 00:07:00 | ||
| Windows Command-Line Tools | 00:16:00 | ||
| Linux Command-Line Tools | 00:10:00 | ||
| Network Scanners | 00:05:00 | ||
| Network Scanning with Nmap | 00:09:00 | ||
| Network Protocol Analyzers | 00:08:00 | ||
| Using Wireshark to Analyze Network Traffic | 00:09:00 | ||
| Using tcpdump to Analyze Network Traffic | 00:08:00 | ||
| Log Files | 00:09:00 | ||
| Centralized Logging | 00:09:00 | ||
| Configuring Linux Log Forwarding | 00:08:00 | ||
| Exam Question Review | 00:03:00 | ||
| Lunux Shell Script Lab | 00:07:00 | ||
| Nmap Lab | 00:05:00 | ||
| Ask Me Anything (AMA) | 00:02:00 | ||
| Handouts | 00:05:00 | ||
| Lab Handouts Part 1 | 00:05:00 | ||
| Lab Handouts Part 2 | 00:05:00 | ||
| Section 06: Securing Individual Systems | |||
| Malware | 00:14:00 | ||
| Weak Configurations | 00:12:00 | ||
| Common Attacks | 00:09:00 | ||
| Driver and Overflow Attacks | 00:08:00 | ||
| Password Attacks | 00:08:00 | ||
| Bots and Botnets | 00:06:00 | ||
| Disk RAID Levels | 00:10:00 | ||
| Securing Hardware | 00:11:00 | ||
| Securing Endpoints | 00:09:00 | ||
| Exam Question Review | 00:02:00 | ||
| Linux Software RAID Lab | 00:08:00 | ||
| Ask Me Anything (AMA) | 00:02:00 | ||
| Handouts | 00:05:00 | ||
| Lab Handouts Part 1 | 00:05:00 | ||
| Lab Handouts Part 2 | 00:05:00 | ||
| Section 07: The Basic LAN | |||
| The OSI Model | 00:13:00 | ||
| ARP Cache Poisoning | 00:09:00 | ||
| Other Layer 2 Attacks | 00:05:00 | ||
| Network Planning | 00:07:00 | ||
| Load Balancing | 00:06:00 | ||
| Securing Network Access | 00:06:00 | ||
| Honeypots | 00:06:00 | ||
| Firewalls | 00:11:00 | ||
| Proxy Servers | 00:06:00 | ||
| Network and Port Address Translation | 00:07:00 | ||
| IP Security (IPsec) | 00:09:00 | ||
| Virtual Private Networks (VPNs) | 00:10:00 | ||
| Intrusion Detection and Prevention Systems (IDS/IPS) | 00:13:00 | ||
| Exam Question Review | 00:03:00 | ||
| Linux Snort IDS Lab | 00:07:00 | ||
| Ask Me Anything (AMA) | 00:01:00 | ||
| Handouts | 00:05:00 | ||
| Lab Handouts | 00:05:00 | ||
| Section 08: Securing Wireless LANs | |||
| Wi-Fi Encryption Standards | 00:10:00 | ||
| RFID, NFC, and Bluetooth | 00:07:00 | ||
| Wi-Fi Coverage and Performance | 00:08:00 | ||
| Wi-Fi Discovery and Attacks | 00:12:00 | ||
| Cracking WPA2 | 00:10:00 | ||
| Wi-Fi Hardening | 00:11:00 | ||
| Exam Question Review | 00:02:00 | ||
| WPA2 Cracking Lab | 00:06:00 | ||
| Ask Me Anything (AMA) | 00:01:00 | ||
| Handouts | 00:05:00 | ||
| Lab Handouts | 00:05:00 | ||
| Section 09: Securing Public Servers | |||
| Defining a Public Server | 00:01:00 | ||
| Common Attacks and Mitigations | 00:10:00 | ||
| Containers and Software-Defined Networking | 00:11:00 | ||
| Hypervisors and Virtual Machines | 00:08:00 | ||
| Cloud Deployment Models | 00:09:00 | ||
| Cloud Service Models | 00:08:00 | ||
| Securing the Cloud | 00:10:00 | ||
| Exam Question Review | 00:02:00 | ||
| Docker Container Lab | 00:04:00 | ||
| Ask Me Anything (AMA) | 00:02:00 | ||
| Handouts | 00:05:00 | ||
| Lab Handouts | 00:05:00 | ||
| Section 10: Securing Dedicated Systems | |||
| Embedded Systems | 00:13:00 | ||
| Industrial Control System (ICS) | 00:07:00 | ||
| Internet of Things (IoT) Devices | 00:10:00 | ||
| Connecting to Dedicated and Mobile Systems | 00:11:00 | ||
| Security Constraints for Dedicated Systems | 00:05:00 | ||
| Mobile Device Deployment and Hardening | 00:11:00 | ||
| Exam Question Review | 00:03:00 | ||
| Smartphone Hardening Lab | 00:03:00 | ||
| Ask Me Anything (AMA) | 00:02:00 | ||
| Handouts | 00:05:00 | ||
| Lab Handouts | 00:05:00 | ||
| Section 11: Physical Security | |||
| Physical Security Overview | 00:01:00 | ||
| Physical Security | 00:10:00 | ||
| Keylogger Demo | 00:05:00 | ||
| Environmental Controls | 00:05:00 | ||
| Exam Question Review | 00:02:00 | ||
| Physical Security Lab | 00:03:00 | ||
| Ask Me Anything (AMA) | 00:03:00 | ||
| Handouts | 00:05:00 | ||
| Lab Handouts | 00:05:00 | ||
| Section 12: Secure Protocols and Applications | |||
| DNS Security | 00:05:00 | ||
| FTP Packet Capture | 00:03:00 | ||
| Secure Web and E-mail | 00:12:00 | ||
| Request Forgery Attacks | 00:05:00 | ||
| Cross-Site Scripting Attacks | 00:07:00 | ||
| Web Application Security | 00:08:00 | ||
| Web App Vulnerability Scanning | 00:06:00 | ||
| Exam Question Review | 00:03:00 | ||
| OWASP ZAP Web App Scan Lab | 00:04:00 | ||
| Ask Me Anything (AMA) | 00:02:00 | ||
| Handouts | 00:05:00 | ||
| Lab Handouts | 00:05:00 | ||
| Section 13: Testing Infrastructure | |||
| Testing Infrastructure Overview | 00:05:00 | ||
| Social Engineering | 00:06:00 | ||
| Social Engineering Attacks | 00:11:00 | ||
| Vulnerability Assessments | 00:09:00 | ||
| Penetration Testing | 00:10:00 | ||
| Security Assessment Tools | 00:12:00 | ||
| The Metasploit Framework | 00:08:00 | ||
| Exam Question Review | 00:02:00 | ||
| Hping3 Forged Packet Lab | 00:06:00 | ||
| Ask Me Anything (AMA) | 00:02:00 | ||
| Handouts | 00:05:00 | ||
| Lab Handouts | 00:05:00 | ||
| Section 14: Dealing with Incidents | |||
| Incident Response Overview | 00:03:00 | ||
| Incident Response Plans (IRPs) | 00:06:00 | ||
| Threat Analysis and Mitigating Actions | 00:08:00 | ||
| Digital Forensics | 00:12:00 | ||
| Gathering Digital Evidence | 00:10:00 | ||
| Business Continuity and Alternate Sites | 00:06:00 | ||
| Data Backup | 00:10:00 | ||
| Exam Question Review | 00:01:00 | ||
| Autopsy Forensic Browser Lab | 00:05:00 | ||
| Ask Me Anything (AMA) | 00:02:00 | ||
| Handouts | 00:05:00 | ||
| Lab Handouts | 00:05:00 | ||
| Order Your Certificate | |||
| Order Your Certificate Now | 00:00:00 | ||
| Trustpilot Review | |||
| Trustpilot Review | 00:00:00 | ||