Section 01: Introduction | |||
Promo | 00:01:00 | ||
Introduction to CompTIA Security+ SY0-601 | 00:03:00 | ||
About the CompTIA Security+ SY0-601 Exam | 00:03:00 | ||
Resource – CompTIA Security+ SY0-601 Exam Objectives | 00:05:00 | ||
Section 02: Risk Management | |||
Defining Risk | 00:08:00 | ||
Threats and Vulnerabilities | 00:07:00 | ||
Threat Intelligence | 00:11:00 | ||
Risk Management Concepts | 00:07:00 | ||
Security Controls | 00:09:00 | ||
Risk Assessments and Treatments | 00:06:00 | ||
Quantitative Risk Assessments | 00:07:00 | ||
Qualitative Risk Assessments | 00:04:00 | ||
Business Impact Analysis | 00:09:00 | ||
Data Types and Roles | 00:11:00 | ||
Security and the Information Life Cycle | 00:09:00 | ||
Data Destruction | 00:06:00 | ||
Personnel Risk and Policies | 00:10:00 | ||
Third-Party Risk Management | 00:09:00 | ||
Agreement Types | 00:07:00 | ||
Exam Question Review | 00:02:00 | ||
Wiping Disks with the dd Command Lab | 00:06:00 | ||
Ask Me Anything (AMA) | 00:02:00 | ||
Handouts | 00:05:00 | ||
Lab Handouts | 00:05:00 | ||
Section 03: Cryptography | |||
Cryptography Basics | 00:16:00 | ||
Data Protection | 00:09:00 | ||
Cryptographic Methods | 00:07:00 | ||
Symmetric Cryptosystems | 00:13:00 | ||
Symmetric Block Modes | 00:08:00 | ||
Asymmetric Cryptosystems | 00:13:00 | ||
Diffie-Hellman | 00:07:00 | ||
Hashing | 00:09:00 | ||
Understanding Digital Certificates | 00:08:00 | ||
Trust Models | 00:05:00 | ||
Public Key Infrastructure | 00:04:00 | ||
Certificate Types | 00:14:00 | ||
Touring Certificates | 00:09:00 | ||
Cryptographic Attacks | 00:05:00 | ||
Password Cracking | 00:10:00 | ||
Password Cracking Demo | 00:06:00 | ||
Exam Question Review | 00:02:00 | ||
SSH Public Key Authentication Lab | 00:09:00 | ||
Ask Me Anything (AMA) | 00:02:00 | ||
Handouts | 00:05:00 | ||
Lab Handouts | 00:05:00 | ||
Section 04: Identity and Account Management | |||
Identification, Authentication, and Authorization | 00:08:00 | ||
Enabling Multifactor Authentication | 00:05:00 | ||
Authorization | 00:05:00 | ||
Accounting | 00:05:00 | ||
Authentication Methods | 00:14:00 | ||
Access Control Schemes | 00:07:00 | ||
Account Management | 00:13:00 | ||
Network Authentication | 00:09:00 | ||
Identity Management Systems | 00:06:00 | ||
Exam Question Review | 00:02:00 | ||
Creating LInux Users and Groups Lab | 00:06:00 | ||
Ask Me Anything (AMA) | 00:01:00 | ||
Handouts | 00:05:00 | ||
Lab Handouts | 00:05:00 | ||
Section 05: Tools of the Trade | |||
Touring the CLI | 00:16:00 | ||
Shells | 00:06:00 | ||
The Windows Command Line | 00:05:00 | ||
Microsoft PowerShell | 00:13:00 | ||
Linux Shells | 00:12:00 | ||
Python Scripts | 00:07:00 | ||
Windows Command-Line Tools | 00:16:00 | ||
Linux Command-Line Tools | 00:10:00 | ||
Network Scanners | 00:05:00 | ||
Network Scanning with Nmap | 00:09:00 | ||
Network Protocol Analyzers | 00:08:00 | ||
Using Wireshark to Analyze Network Traffic | 00:09:00 | ||
Using tcpdump to Analyze Network Traffic | 00:08:00 | ||
Log Files | 00:09:00 | ||
Centralized Logging | 00:09:00 | ||
Configuring Linux Log Forwarding | 00:08:00 | ||
Exam Question Review | 00:03:00 | ||
Lunux Shell Script Lab | 00:07:00 | ||
Nmap Lab | 00:05:00 | ||
Ask Me Anything (AMA) | 00:02:00 | ||
Handouts | 00:05:00 | ||
Lab Handouts Part 1 | 00:05:00 | ||
Lab Handouts Part 2 | 00:05:00 | ||
Section 06: Securing Individual Systems | |||
Malware | 00:14:00 | ||
Weak Configurations | 00:12:00 | ||
Common Attacks | 00:09:00 | ||
Driver and Overflow Attacks | 00:08:00 | ||
Password Attacks | 00:08:00 | ||
Bots and Botnets | 00:06:00 | ||
Disk RAID Levels | 00:10:00 | ||
Securing Hardware | 00:11:00 | ||
Securing Endpoints | 00:09:00 | ||
Exam Question Review | 00:02:00 | ||
Linux Software RAID Lab | 00:08:00 | ||
Ask Me Anything (AMA) | 00:02:00 | ||
Handouts | 00:05:00 | ||
Lab Handouts Part 1 | 00:05:00 | ||
Lab Handouts Part 2 | 00:05:00 | ||
Section 07: The Basic LAN | |||
The OSI Model | 00:13:00 | ||
ARP Cache Poisoning | 00:09:00 | ||
Other Layer 2 Attacks | 00:05:00 | ||
Network Planning | 00:07:00 | ||
Load Balancing | 00:06:00 | ||
Securing Network Access | 00:06:00 | ||
Honeypots | 00:06:00 | ||
Firewalls | 00:11:00 | ||
Proxy Servers | 00:06:00 | ||
Network and Port Address Translation | 00:07:00 | ||
IP Security (IPsec) | 00:09:00 | ||
Virtual Private Networks (VPNs) | 00:10:00 | ||
Intrusion Detection and Prevention Systems (IDS/IPS) | 00:13:00 | ||
Exam Question Review | 00:03:00 | ||
Linux Snort IDS Lab | 00:07:00 | ||
Ask Me Anything (AMA) | 00:01:00 | ||
Handouts | 00:05:00 | ||
Lab Handouts | 00:05:00 | ||
Section 08: Securing Wireless LANs | |||
Wi-Fi Encryption Standards | 00:10:00 | ||
RFID, NFC, and Bluetooth | 00:07:00 | ||
Wi-Fi Coverage and Performance | 00:08:00 | ||
Wi-Fi Discovery and Attacks | 00:12:00 | ||
Cracking WPA2 | 00:10:00 | ||
Wi-Fi Hardening | 00:11:00 | ||
Exam Question Review | 00:02:00 | ||
WPA2 Cracking Lab | 00:06:00 | ||
Ask Me Anything (AMA) | 00:01:00 | ||
Handouts | 00:05:00 | ||
Lab Handouts | 00:05:00 | ||
Section 09: Securing Public Servers | |||
Defining a Public Server | 00:01:00 | ||
Common Attacks and Mitigations | 00:10:00 | ||
Containers and Software-Defined Networking | 00:11:00 | ||
Hypervisors and Virtual Machines | 00:08:00 | ||
Cloud Deployment Models | 00:09:00 | ||
Cloud Service Models | 00:08:00 | ||
Securing the Cloud | 00:10:00 | ||
Exam Question Review | 00:02:00 | ||
Docker Container Lab | 00:04:00 | ||
Ask Me Anything (AMA) | 00:02:00 | ||
Handouts | 00:05:00 | ||
Lab Handouts | 00:05:00 | ||
Section 10: Securing Dedicated Systems | |||
Embedded Systems | 00:13:00 | ||
Industrial Control System (ICS) | 00:07:00 | ||
Internet of Things (IoT) Devices | 00:10:00 | ||
Connecting to Dedicated and Mobile Systems | 00:11:00 | ||
Security Constraints for Dedicated Systems | 00:05:00 | ||
Mobile Device Deployment and Hardening | 00:11:00 | ||
Exam Question Review | 00:03:00 | ||
Smartphone Hardening Lab | 00:03:00 | ||
Ask Me Anything (AMA) | 00:02:00 | ||
Handouts | 00:05:00 | ||
Lab Handouts | 00:05:00 | ||
Section 11: Physical Security | |||
Physical Security Overview | 00:01:00 | ||
Physical Security | 00:10:00 | ||
Keylogger Demo | 00:05:00 | ||
Environmental Controls | 00:05:00 | ||
Exam Question Review | 00:02:00 | ||
Physical Security Lab | 00:03:00 | ||
Ask Me Anything (AMA) | 00:03:00 | ||
Handouts | 00:05:00 | ||
Lab Handouts | 00:05:00 | ||
Section 12: Secure Protocols and Applications | |||
DNS Security | 00:05:00 | ||
FTP Packet Capture | 00:03:00 | ||
Secure Web and E-mail | 00:12:00 | ||
Request Forgery Attacks | 00:05:00 | ||
Cross-Site Scripting Attacks | 00:07:00 | ||
Web Application Security | 00:08:00 | ||
Web App Vulnerability Scanning | 00:06:00 | ||
Exam Question Review | 00:03:00 | ||
OWASP ZAP Web App Scan Lab | 00:04:00 | ||
Ask Me Anything (AMA) | 00:02:00 | ||
Handouts | 00:05:00 | ||
Lab Handouts | 00:05:00 | ||
Section 13: Testing Infrastructure | |||
Testing Infrastructure Overview | 00:05:00 | ||
Social Engineering | 00:06:00 | ||
Social Engineering Attacks | 00:11:00 | ||
Vulnerability Assessments | 00:09:00 | ||
Penetration Testing | 00:10:00 | ||
Security Assessment Tools | 00:12:00 | ||
The Metasploit Framework | 00:08:00 | ||
Exam Question Review | 00:02:00 | ||
Hping3 Forged Packet Lab | 00:06:00 | ||
Ask Me Anything (AMA) | 00:02:00 | ||
Handouts | 00:05:00 | ||
Lab Handouts | 00:05:00 | ||
Section 14: Dealing with Incidents | |||
Incident Response Overview | 00:03:00 | ||
Incident Response Plans (IRPs) | 00:06:00 | ||
Threat Analysis and Mitigating Actions | 00:08:00 | ||
Digital Forensics | 00:12:00 | ||
Gathering Digital Evidence | 00:10:00 | ||
Business Continuity and Alternate Sites | 00:06:00 | ||
Data Backup | 00:10:00 | ||
Exam Question Review | 00:01:00 | ||
Autopsy Forensic Browser Lab | 00:05:00 | ||
Ask Me Anything (AMA) | 00:02:00 | ||
Handouts | 00:05:00 | ||
Lab Handouts | 00:05:00 | ||
Order Your Certificate | |||
Order Your Certificate Now | 00:00:00 |
Membership renews after 12 months. You can cancel anytime from your account.