
$7.00
Chapter 0 - About Security+ | ||
---|---|---|
1. Introduction to the CompTIA Security+ (SY0-701) Exam Prep Course | 2:42 | |
2. About the CompTIA Security+ (SY0-701) Exam | 7:54 | |
3. How to Take Your CompTIA Security+ (SY0-701) Exam | 8:38 |
Chapter 1 - Risk Management | ||
---|---|---|
1. Defining Business Risk | 5:06 | |
2. Threat Actors, Part 1 | 4:31 | |
3. Threat Actors, Part 2 | 2:22 | |
4. Threat Intelligence | 9:33 | |
5. Risk Management Concepts | 7:12 | |
6. Security Controls | 9:07 | |
7. Risk Assessments and Treatments | 5:32 | |
8. Quantitative Risk Assessments | 6:25 | |
9. Qualitative Risk Assessments | 3:43 | |
10. Security and the Information Life Cycle | 8:52 | |
11. Data Destruction | 5:52 | |
12. Chapter 1 Exam Question Review | 1:40 | |
13. Wiping Disks with the dd Command Lab | 5:39 |
Chapter 2 - Foundations of Cryptography | ||
---|---|---|
1. Cryptography Basics | 15:39 | |
2. Hashing | 8:25 | |
3. Cryptographic Attacks | 5:06 | |
4. Password Cracking | 9:56 | |
5. Password Cracking Demo | 6:09 | |
6. Chapter 2 Exam Question Review | 2:27 | |
7. SSH Public Key Authentication Lab | 9:04 |
Chapter 3 - Physical Security | ||
---|---|---|
1. Physical Security | 9:42 | |
2. Keylogger Demo | 4:45 | |
3. Environmental Controls | 5:16 | |
4. Chapter 3 Exam Question Review | 2:25 | |
5. Physical Security Lab | 2:54 |
Chapter 4 - Identity and Account | ||
---|---|---|
1. Identification, Authentication, and Authorization | 7:48 | |
2. Enabling Multifactor Authentication | 4:36 | |
3. Authorization | 4:42 | |
4. Accounting | 5:15 | |
5. Authentication Methods | 13:54 | |
6. Access Control Schemes | 6:39 | |
7. Account Management | 12:57 | |
8. Network Authentication | 8:50 | |
9. Identity Management Systems | 5:45 | |
10. Chapter 4 Exam Question Review | 2:16 | |
11. Creating Linux Users and Groups Lab | 5:45 |
Chapter 5 - Tools of the Trade | ||
---|---|---|
1. Touring the CLI | 15:02 | |
2. Shells | 5:54 | |
3. The Windows Command Line | 4:24 | |
4. Microsoft PowerShell | 12:16 | |
5. Linux Shells | 10:51 | |
6. Network Scanners | 5:01 | |
7. Network Scanning with Nmap | 8:51 | |
8. Network Protocol Analyzers | 7:42 | |
9. Using Wireshark to Analyze Network Traffic | 8:12 | |
10. Using tcpdump to Analyze Network Traffic | 8:09 | |
11. Log Files | 8:27 | |
12. Centralized Logging | 8:41 | |
13. Cybersecurity Benchmark Tools | 4:43 | |
14. Configuring Linux Log Forwarding | 8:14 | |
15. Chapter 5 Exam Question Review | 2:57 | |
16. Linux Shell Script Lab | 7:10 | |
17. Nmap Lab | 4:32 |
Chapter 6 - Securing Individual Systems | ||
---|---|---|
1. Malware | 13:12 | |
2. Weak Configurations | 11:22 | |
3. Common Attacks | 8:54 | |
4. Overflow Attacks | 5:28 | |
5. Password Attacks | 7:52 | |
6. Bots and Botnets | 6:03 | |
7. Disk RAID Levels | 10:01 | |
8. Securing Hardware | 10:50 | |
9. Securing Endpoints | 8:46 | |
10. Securing Data with Encryption | 6:22 | |
11. Chapter 6 Exam Question Review | 2:20 | |
12. Linux Software RAID Lab | 7:32 | |
13. Secure Enclave Lab in macOS | 3:30 |
Chapter 7 - Securing The Basic LAN | ||
---|---|---|
1. Data Protection | 9:23 | |
2. Cryptographic Methods | 7:04 | |
3. Symmetric Cryptosystems | 12:29 | |
4. Symmetric Block Modes | 7:56 | |
5. Asymmetric Cryptosystems | 12:35 | |
6. Understanding Digital Certificates | 7:09 | |
7. Trust Models | 4:36 | |
8. Public Key Infrastructure | 3:22 | |
9. Certificate Types | 12:03 | |
10. Touring Certificates | 7:52 | |
11. Network Architecture Planning | 3:32 | |
12. The OSI Model | 12:31 | |
13. ARP Cache Poisoning | 8:31 | |
14. Other Layer 2 Attacks | 5:07 | |
15. Network Planning | 6:54 | |
16. Zero Trust Network Access (ZTNA) 2.0 | 9:32 | |
17. Load Balancing | 6:02 | |
18. Securing Network Access | 6:08 | |
19. Honeypots | 5:52 | |
20. Static and Dynamic Code Analysis | 4:35 | |
21. Firewalls | 11:09 | |
22. Proxy Servers | 6:04 | |
23. Web Filtering | 5:07 | |
24. Network and Port Address Translation | 6:38 | |
25. IP Security (IPsec) | 8:41 | |
26. SD-WAN and SASE | 2:59 | |
27. Virtual Private Networks (VPNs) | 9:49 | |
28. Intrusion Detection and Prevention Systems (IDS/IPS) | 12:50 | |
29. Chapter 7 Exam Question Review | 3:25 | |
30. Linux Snort IDS Lab | 7:21 |
Chapter 8 - Securing Wireless LANs | ||
---|---|---|
1. Wi-Fi Encryption Standards | 9:25 | |
2. RFID, NFC, and Bluetooth | 6:34 | |
3. Wi-Fi Coverage and Performance | 8:06 | |
4. Wi-Fi Discovery and Attacks | 11:57 | |
5. Cracking WPA2 | 10:13 | |
6. Wi-Fi Hardening | 10:15 | |
7. Chapter 8 Exam Question Review | 01:42 | |
8. WPA2 Cracking Lab | 6:29 |
Chapter 9 - Securing Virtual and Cloud Environments | ||
---|---|---|
1. Defending a Public Server | 0:45 | |
2. Common Attacks and Mitigations | 9:36 | |
3. DDoS Attacks in the Real World | 2:34 | |
4. Containers and Software-Defined Networking | 11:17 | |
5. Hypervisors and Virtual Machines | 8:13 | |
6. Cloud Deployment Models | 8:35 | |
7. Cloud Service Models | 8:16 | |
8. Securing the Cloud | 10:06 | |
9. Chapter 9 Exam Question Review | 02:11 | |
10. Docker Container Lab | 4:08 |
Chapter 10 - Securing Dedicated and Mobile Systems | ||
---|---|---|
1. Industrial Control System (ICS) | 6:32 | |
2. Internet of Things (IoT) Devices | 9:54 | |
3. Connecting to Dedicated and Mobile Systems | 10:39 | |
4. Security Constraints for Dedicated Systems | 4:58 | |
5. Mobile Device Deployment and Hardening | 10:53 | |
6. Chapter 10 Exam Question Review | 2:33 | |
7. Smartphone Hardening Lab | 2:32 | |
8. Embedded Systems | 12:53 |
Chapter 11 - Secure Protocols and Applications | ||
---|---|---|
1. FTP Packet Capture | 0:48 | |
2. Secure Web and E-mail | 3:19 | |
3. Request Forgery Attacks | 11:31 | |
4. Cross-Site Scripting Attacks | 4:41 | |
5. DNS Security | 6:58 | |
6. Web Application Security | 5:09 | |
7. OWASP Top 10 | 11:39 | |
8. Web App Vulnerability Scanning | 5:44 | |
9. Chapter 11 Exam Question Review | 3:09 | |
10. OWASP ZAP Web App Scan Lab | 4:23 |
Chapter 12 - Testing Infrastructure | ||
---|---|---|
1. Testing Infrastructure Overview | 4:31 | |
2. Social Engineering Attacks | 5:24 | |
3. Vulnerability Assessments | 8:43 | |
4. Penetration Testing | 9:29 | |
5. The Metasploit Framework | 7:52 | |
6. Chapter 12 Exam Question Review | 1:46 |
Chapter 13 - Business Security Impact | ||
---|---|---|
1. Introduction to Business Security | 5:54 | |
2. Business Impact Analysis | 9:05 | |
3. Data Types and Roles | 11:16 | |
4. Personnel Risk and Policies | 10:11 | |
5. Attestation | 3:13 | |
6. Internal Audits and Assessments | 5:19 | |
7. External Audits and Assessments | 6:13 | |
8. Third-Party Risk Management | 8:16 | |
9. Agreement Types | 6:15 | |
10. Change Management | 4:01 | |
11. Technical Change Management | 6:57 | |
12. What Is Automation and Orchestration? | 3:34 | |
13. Benefits of Automation and Orchestration | 2:47 | |
14. Use Cases of Automation and Orchestration | 7:25 | |
15. Other Considerations of Automation and Orchestration | 5:22 | |
16. Putting It All Together | 6:00 | |
17. Exploring the NIST Frameworks | 7:30 |
Chapter 14 - Dealing with Incidents | ||
---|---|---|
1. Incident Response Overview | 2:22 | |
2. Incident Response Plans (IRPs) | 5:46 | |
3. IRP Testing | 5:40 | |
4. Threat Analysis and Mitigating Actions | 7:27 | |
5. Digital Forensics | 4:59 | |
6. Business Continuity and Alternate Sites | 6:02 | |
7. Data Backup | 9:31 | |
8. Chapter 14 Exam Question Review | 1:00 | |
9. Autopsy Forensic Browser Lab | 4:58 |
Get 100% Latest Exam Questions, Accurate & Verified Answers!
30 Days Free Updates, Instant Download!
Only Registered Members
Can View Online Video Courses
Please fill out your email address below in order to view Online Courses.. Registration is Free and Easy, You Simply need to provide an email address.
Log into your Prepaway Account
Please Log In to view Online Course
Registration is free and easy - just provide your E-mail address.
Click Here to Register