Curriculum For This Course
Video tutorials list
-
Chapter 0 - About Security+
Video Name Time 1. Introduction to the CompTIA Security+ (SY0-701) Exam Prep Course 2:42 2. About the CompTIA Security+ (SY0-701) Exam 7:54 3. How to Take Your CompTIA Security+ (SY0-701) Exam 8:38 -
Chapter 1 - Risk Management
Video Name Time 1. Defining Business Risk 5:06 2. Threat Actors, Part 1 4:31 3. Threat Actors, Part 2 2:22 4. Threat Intelligence 9:33 5. Risk Management Concepts 7:12 6. Security Controls 9:07 7. Risk Assessments and Treatments 5:32 8. Quantitative Risk Assessments 6:25 9. Qualitative Risk Assessments 3:43 10. Security and the Information Life Cycle 8:52 11. Data Destruction 5:52 12. Chapter 1 Exam Question Review 1:40 13. Wiping Disks with the dd Command Lab 5:39 -
Chapter 2 - Foundations of Cryptography
Video Name Time 1. Cryptography Basics 15:39 2. Hashing 8:25 3. Cryptographic Attacks 5:06 4. Password Cracking 9:56 5. Password Cracking Demo 6:09 6. Chapter 2 Exam Question Review 2:27 7. SSH Public Key Authentication Lab 9:04 -
Chapter 3 - Physical Security
Video Name Time 1. Physical Security 9:42 2. Keylogger Demo 4:45 3. Environmental Controls 5:16 4. Chapter 3 Exam Question Review 2:25 5. Physical Security Lab 2:54 -
Chapter 4 - Identity and Account
Video Name Time 1. Identification, Authentication, and Authorization 7:48 2. Enabling Multifactor Authentication 4:36 3. Authorization 4:42 4. Accounting 5:15 5. Authentication Methods 13:54 6. Access Control Schemes 6:39 7. Account Management 12:57 8. Network Authentication 8:50 9. Identity Management Systems 5:45 10. Chapter 4 Exam Question Review 2:16 11. Creating Linux Users and Groups Lab 5:45 -
Chapter 5 - Tools of the Trade
Video Name Time 1. Touring the CLI 15:02 2. Shells 5:54 3. The Windows Command Line 4:24 4. Microsoft PowerShell 12:16 5. Linux Shells 10:51 6. Network Scanners 5:01 7. Network Scanning with Nmap 8:51 8. Network Protocol Analyzers 7:42 9. Using Wireshark to Analyze Network Traffic 8:12 10. Using tcpdump to Analyze Network Traffic 8:09 11. Log Files 8:27 12. Centralized Logging 8:41 13. Cybersecurity Benchmark Tools 4:43 14. Configuring Linux Log Forwarding 8:14 15. Chapter 5 Exam Question Review 2:57 16. Linux Shell Script Lab 7:10 17. Nmap Lab 4:32 -
Chapter 6 - Securing Individual Systems
Video Name Time 1. Malware 13:12 2. Weak Configurations 11:22 3. Common Attacks 8:54 4. Overflow Attacks 5:28 5. Password Attacks 7:52 6. Bots and Botnets 6:03 7. Disk RAID Levels 10:01 8. Securing Hardware 10:50 9. Securing Endpoints 8:46 10. Securing Data with Encryption 6:22 11. Chapter 6 Exam Question Review 2:20 12. Linux Software RAID Lab 7:32 13. Secure Enclave Lab in macOS 3:30 -
Chapter 7 - Securing The Basic LAN
Video Name Time 1. Data Protection 9:23 2. Cryptographic Methods 7:04 3. Symmetric Cryptosystems 12:29 4. Symmetric Block Modes 7:56 5. Asymmetric Cryptosystems 12:35 6. Understanding Digital Certificates 7:09 7. Trust Models 4:36 8. Public Key Infrastructure 3:22 9. Certificate Types 12:03 10. Touring Certificates 7:52 11. Network Architecture Planning 3:32 12. The OSI Model 12:31 13. ARP Cache Poisoning 8:31 14. Other Layer 2 Attacks 5:07 15. Network Planning 6:54 16. Zero Trust Network Access (ZTNA) 2.0 9:32 17. Load Balancing 6:02 18. Securing Network Access 6:08 19. Honeypots 5:52 20. Static and Dynamic Code Analysis 4:35 21. Firewalls 11:09 22. Proxy Servers 6:04 23. Web Filtering 5:07 24. Network and Port Address Translation 6:38 25. IP Security (IPsec) 8:41 26. SD-WAN and SASE 2:59 27. Virtual Private Networks (VPNs) 9:49 28. Intrusion Detection and Prevention Systems (IDS/IPS) 12:50 29. Chapter 7 Exam Question Review 3:25 30. Linux Snort IDS Lab 7:21 -
Chapter 8 - Securing Wireless LANs
Video Name Time 1. Wi-Fi Encryption Standards 9:25 2. RFID, NFC, and Bluetooth 6:34 3. Wi-Fi Coverage and Performance 8:06 4. Wi-Fi Discovery and Attacks 11:57 5. Cracking WPA2 10:13 6. Wi-Fi Hardening 10:15 7. Chapter 8 Exam Question Review 01:42 8. WPA2 Cracking Lab 6:29 -
Chapter 9 - Securing Virtual and Cloud Environments
Video Name Time 1. Defending a Public Server 0:45 2. Common Attacks and Mitigations 9:36 3. DDoS Attacks in the Real World 2:34 4. Containers and Software-Defined Networking 11:17 5. Hypervisors and Virtual Machines 8:13 6. Cloud Deployment Models 8:35 7. Cloud Service Models 8:16 8. Securing the Cloud 10:06 9. Chapter 9 Exam Question Review 02:11 10. Docker Container Lab 4:08 -
Chapter 10 - Securing Dedicated and Mobile Systems
Video Name Time 1. Industrial Control System (ICS) 6:32 2. Internet of Things (IoT) Devices 9:54 3. Connecting to Dedicated and Mobile Systems 10:39 4. Security Constraints for Dedicated Systems 4:58 5. Mobile Device Deployment and Hardening 10:53 6. Chapter 10 Exam Question Review 2:33 7. Smartphone Hardening Lab 2:32 8. Embedded Systems 12:53 -
Chapter 11 - Secure Protocols and Applications
Video Name Time 1. FTP Packet Capture 0:48 2. Secure Web and E-mail 3:19 3. Request Forgery Attacks 11:31 4. Cross-Site Scripting Attacks 4:41 5. DNS Security 6:58 6. Web Application Security 5:09 7. OWASP Top 10 11:39 8. Web App Vulnerability Scanning 5:44 9. Chapter 11 Exam Question Review 3:09 10. OWASP ZAP Web App Scan Lab 4:23 -
Chapter 12 - Testing Infrastructure
Video Name Time 1. Testing Infrastructure Overview 4:31 2. Social Engineering Attacks 5:24 3. Vulnerability Assessments 8:43 4. Penetration Testing 9:29 5. The Metasploit Framework 7:52 6. Chapter 12 Exam Question Review 1:46 -
Chapter 13 - Business Security Impact
Video Name Time 1. Introduction to Business Security 5:54 2. Business Impact Analysis 9:05 3. Data Types and Roles 11:16 4. Personnel Risk and Policies 10:11 5. Attestation 3:13 6. Internal Audits and Assessments 5:19 7. External Audits and Assessments 6:13 8. Third-Party Risk Management 8:16 9. Agreement Types 6:15 10. Change Management 4:01 11. Technical Change Management 6:57 12. What Is Automation and Orchestration? 3:34 13. Benefits of Automation and Orchestration 2:47 14. Use Cases of Automation and Orchestration 7:25 15. Other Considerations of Automation and Orchestration 5:22 16. Putting It All Together 6:00 17. Exploring the NIST Frameworks 7:30 -
Chapter 14 - Dealing with Incidents
Video Name Time 1. Incident Response Overview 2:22 2. Incident Response Plans (IRPs) 5:46 3. IRP Testing 5:40 4. Threat Analysis and Mitigating Actions 7:27 5. Digital Forensics 4:59 6. Business Continuity and Alternate Sites 6:02 7. Data Backup 9:31 8. Chapter 14 Exam Question Review 1:00 9. Autopsy Forensic Browser Lab 4:58
Add Comment