Autoplay
Autocomplete
Previous Lesson
Complete and Continue
CompTIA Security+ Complete Course & Practice Exam
Training Overview
Description of Training
Video Overview (2:10)
Overview of Security
Welcome (5:34)
Overview of Security (2:58)
CIA Triad (3:57)
AAA of Security (OBJ 2.4) (3:08)
Security Threats (OBJ 1.1 & 1.2) (2:59)
Mitigating Threats (OBJ 5.1) (2:49)
Hackers (OBJ 1.5) (4:56)
Threat Actors (1.5) (3:15)
** Threat Intelligence and Sources (OBJ 1.5) (8:55)
** Threat Hunting (OBJ 1.7) (6:54)
** Attack Frameworks (OBJ 4.2) (11:13)
Quiz: Overview of Security
Malware
Malware (OBJ 1.2) (0:42)
Viruses (OBJ 1.2) (6:23)
Worms (OBJ 1.2) (2:12)
Trojans (OBJ 1.2) (2:51)
Demo: Viruses and Trojans (OBJ 1.2) (6:18)
Ransomware (OBJ 1.2) (2:33)
Spyware (OBJ 1.2) (2:42)
Rootkits (OBJ 1.2 & 1.3) (3:32)
Spam (OBJ 1.1) (2:59)
Summary of Malware (2:05)
Quiz: Malware
Malware Infections
Malware Infections (4:15)
Common Delivery Methods (OBJ 1.1 & 1.5) (4:29)
Demo Phishing (OBJ 1.1 & 5.3) (5:22)
Botnets and Zombies (OBJ 1.2 & 1.4) (3:33)
Active Interception and Privilege Escalation (OBJ 1.3 & 1.4) (2:31)
Demo: Privilege Escalation (OBJ 1.3 & 1.8) (5:44)
Backdoors and Logic Bombs (OBJ 1.2) (3:51)
Symptoms of Infection (OBJ 1.2) (4:13)
Removing Malware (OBJ 4.2) (5:04)
Preventing Malware (OBJ 1.6 & 3.2) (5:59)
** Malware Exploitation (OBJ 1.2 & 1.4) (7:38)
Quiz: Malware Infection
Security Applications and Devices
Security Applications and Devices (0:35)
Software Firewalls (OBJ 3.2) (4:18)
Demo: Software Firewalls (OBJ 3.2) (6:47)
IDS (OBJ 3.2 & 3.3) (5:05)
Pop-up Blockers (OBJ 1.1, 3.3, 4.4) (3:12)
Data Loss Prevention (DLP) (OBJ 2.1, 3.2, 4.4) (3:46)
Securing the BIOS (OBJ 3.2) (3:58)
Securing Storage Devices (OBJ 2.1, 2.5, & 3.3) (3:29)
Disk Encryption (OBJ 2.1, 2.8 & 3.2) (4:54)
** Endpoint Analysis (OBJ 3.1 & 3.3) (5:47)
Quiz: Security Applications and Devices
Mobile Device Security
Mobile Device Security (OBJ 1.5) (1:17)
Securing Wireless Devices (OBJ 3.4 & 3.5) (1:33)
Mobile Malware (OBJ 1.1 & 3.5) (6:21)
SIM Cloning & ID Theft (OBJ 1.1, 2.4, & 2.6) (4:03)
Bluetooth Attacks (OBJ 1.4 & 3.4) (2:11)
Mobile Device Theft (OBJ 3.5) (3:13)
Security of Apps (OBJ 3.1 & 3.5) (5:09)
BYOD (OBJ 3.5) (4:59)
Hardening Mobile Devices (OBJ 3.5) (3:54)
Quiz: Mobile Device Security
Hardening
Hardening (OBJ 3.2) (1:50)
Unnecessary Applications (OBJ 1.6) (3:14)
Restricting Applications (OBJ 3.2 & 4.4) (2:59)
Demo: Unnecessary Services (OBJ 3.2 & 3.3) (5:38)
Trusted Operating System (OBJ 3.2) (1:59)
Updates and Patches (OBJ 1.6 & 3.2) (3:29)
Patch Management (OBJ 1.6 & 3.2) (3:52)
Group Policies (OBJ 2.1) (2:36)
Demo: Group Policies (OBJ 3.2) (4:09)
File Systems and Hard Drives (OBJ 2.1 & 3.2) (3:21)
Quiz: Hardening
Supply Chain Management
** Supply Chain Assessment (OBJ 1.2, 1.5, & 1.6) (5:25)
** Root of Trust (OBJ 3.2) (4:36)
** Trusted Firmware (OBJ 3.2) (4:55)
** Secure Processing (OBJ 3.2) (4:03)
Quiz: Supply Chain Management
Virtualization
Virtualization (OBJ 2.2) (2:10)
Hypervisors (OBJ 2.2) (2:40)
Demo: How to create a VM (OBJ 2.2) (4:41)
Threats to VMs (OBJ 2.2) (3:46)
Securing VMs (OBJ 2.2) (3:50)
Demo: Securing VMs (4:43)
Quiz: Virtualization
Application Security
Application Security (1:46)
Web Browser Security (OBJ 3.2 & 3.3) (6:42)
Web Browser Concerns (OBJ 3.2 & 3.3) (3:22)
Demo Web Browser Configuration(OBJ 3.2 & 3.3) (5:22)
Securing Applications (OBJ 1.4 & 3.2) (4:52)
Quiz: Application Security
Secure Software Development
Software Development (OBJ 2.1 & 2.3) (8:37)
SDLC Principles (OBJ 1.6, 2.3, 3.2, & 5.3) (6:25)
Testing Methods (OBJ 2.3 & 3.2) (7:02)
Software Vulnerabilities and Exploits (OBJ 1.2, 1.3, & 1.6) (3:47)
Buffer Overflows (OBJ 1.3) (6:18)
Demo: Buffer Overflow Attack (OBJ 1.3) (6:28)
XSS and XSRF (OBJ 1.3) (3:10)
SQL Injection (OBJ 1.3) (6:28)
Demo: SQL Injection (OBJ 1.2 & 1.3) (7:16)
** XML Vulnerabilities (OBJ 1.3) (5:10)
** Race Conditions (OBJ 1.3) (5:50)
** Design Vulnerabilities (OBJ 1.3) (4:16)
Quiz: Secure Software Development
Network Design
Network Security (0:47)
OSI Model (OBJ 3.3 & 3.6) (6:03)
Switches (OBJ 1.4 & 2.7) (3:35)
Routers (OBJ 3.3) (2:30)
Network Zones (OBJ 3.3) (3:29)
** Jumpbox (OBJ 3.5) (5:03)
Network Access Control (NAC) (OBJ 3.3 & 4.4) (2:43)
VLANs (OBJ 3.3) (1:32)
Subnetting (OBJ 3.6) (1:53)
Network Address Translation (OBJ 3.3) (2:35)
Telephony (OBJ 3.1) (6:00)
Quiz: Network Design
Perimeter Security
Perimeter Security (0:49)
Firewalls (OBJ 3.3 & 4.4) (8:04)
Demo SOHO Firewall (OBJ 3.3 & 4.4) (4:07)
Proxy Servers (OBJ 3.3 & 4.4) (4:15)
Honeypots and Honeynets (OBJ 2.1) (1:24)
Data Loss Prevention (OBJ 2.1, 3.2, & 4.4) (1:37)
NIDS vs NIPS (OBJ 3.3) (4:13)
Unified Threat Management (OBJ 3.2 & 3.3) (1:55)
Quiz: Perimeter Security
Cloud Security
Cloud Computing (OBJ 1.5, 2.2, 3.5, & 3.6) (3:32)
Cloud Types (OBJ 2.2 & 3.6) (2:54)
As a Service (OBJ 2.2) (7:07)
Cloud Security (OBJ 2.5 & 3.6) (2:28)
Defending Servers (OBJ 1.7, 3.1, and 3.2) (4:35)
** Cloud-based Infrastructure (OBJ 1.2, 1.6, 2.2, 2.4, 2.5, & 3.6) (7:22)
** CASB (OBJ 2.1) (4:28)
** API (OBJ 2.1) (6:09)
** FAAS and Serverless (OBJ 2.2) (8:08)
** Cloud Threats (OBJ 1.3, 1.6, 2.1, & 2.2) (8:11)
Quiz: Cloud Security
Automation
** Workflow Orchestration (OBJ 2.3) (3:59)
** CI/CD (OBJ 2.3) (7:05)
** DevSecOps (OBJ 2.3) (4:51)
** IAC (OBJ 2.2) (4:22)
** Machine Learning (OBJ 1.2) (8:30)
Quiz: Automation
Network Attacks
Network Attacks (OBJ 1.4) (0:40)
Ports and Protocols (OBJ 3.1) (4:27)
Memorization of Ports (OBJ 3.1) (11:33)
Unnecessary Ports (OBJ 1.6 & 3.2) (3:24)
Denial of Service (OBJ 1.3 & 1.4) (7:58)
DDoS (OBJ 1.2, 1.3, & 1.4) (1:39)
Stopping a DDoS (OBJ 2.1 & 2.3) (2:29)
Spoofing (OBJ 1.4 & 3.3) (1:19)
Hijacking (OBJ 1.3 & 1.4) (3:47)
Replay Attack (OBJ 1.3) (1:29)
Demo: Null Sessions (OBJ 1.6) (2:27)
Transitive Attacks (OBJ 2.4) (1:27)
DNS Attacks (OBJ 1.1, 1.4 & 3.1) (4:36)
ARP Poisoning (OBJ 1.4) (1:33)
Quiz: Network Attacks
Securing Networks
Securing Networks (OBJ 3.3) (0:52)
Securing Network Devices (OBJ 1.2, 1.6, 3.3, & 3.7) (6:45)
Securing Network Media (OBJ 2.7) (8:51)
Securing WiFi Devices (OBJ 1.4 & 3.4) (4:25)
Wireless Encryption (OBJ 1.6 & 3.4) (5:33)
Wireless Access Points(OBJ 1.4 & 3.4) (6:14)
Wireless Attacks (OBJ 1.2, 1.4 & 1.8) (4:18)
Demo: Wireless Attack (OBJ 1.4) (7:42)
** WPA3 (OBJ 3.4) (6:08)
Other Wireless Technologies (OBJ 1.4 & 3.5) (6:05)
Quiz: Securing Networks
Physical Security
Physical Security (OBJ 2.7) (1:33)
Surveillance (OBJ 2.7) (2:54)
Door Locks (OBJ 2.7) (3:50)
Demo: Lock Picking (OBJ 2.7) (1:40)
Biometric Readers (OBJ 2.4) (4:18)
Quiz: Physical Security
Facilities Security
Facilities Security (OBJ 2.7) (0:39)
Fire Suppression (OBJ 2.7) (6:24)
HVAC (OBJ 2.5, 2.6, & 2.7) (2:26)
Shielding (OBJ 2.7) (2:37)
Vehicular Vulnerabilities (OBJ 2.6 & 2.7) (6:53)
** IoT Vulnerabilities (OBJ 2.6) (3:29)
** Embedded System Vulnerabilities (OBJ 2.6) (6:52)
** ICS and SCADA Vulnerabilities (OBJ 2.6) (8:19)
** Mitigating Vulnerabilities (OBJ 2.6) (3:30)
** Premise System Vulnerabilities (OBJ 1.2, 1.3, 1.7, & 2.6) (6:14)
Quiz: Facilities Security
Authentication
Authentication (OBJ 2.4, 3.5, & 3.8) (5:56)
Authenication Models (OBJ 2.4, 3.5, 3.8, & 3.9) (5:20)
802.1x (OBJ 3.4 & 3.8) (3:47)
LDAP and Kerberos (OBJ 3.1 & 3.8) (2:29)
Remote Desktop Services (OBJ 3.1) (1:54)
Remote Access Services (OBJ 3.1 & 3.8) (2:05)
VPN (OBJ 3.3) (3:05)
RADIUS and TACACS+ (OBJ 3.8) (2:20)
Authentication Summary (OBJ 3.8) (2:06)
** Authentication Attacks (OBJ 1.2) (7:12)
Quiz: Authentication
Access Control
Access Control (OBJ 3.8) (0:53)
Access Control Models (OBJ 3.8) (8:17)
Best Practices (OBJ 2.7, 3.8, & 5.3) (5:46)
Users and Groups (OBJ 3.7 & 3.8) (9:15)
Permissions (OBJ 3.8) (3:44)
Usernames and Password (OBJ 1.6 & 3.7) (2:38)
Demo: Policies (OBJ 3.7) (4:37)
User Account Control (OBJ 3.7 & 3.8) (1:56)
Quiz: Access Control
Risk Assessments
Risk Assessments (OBJ 5.4) (8:36)
Qualitative Risk (OBJ 5.4) (4:09)
Quantitative Risk (OBJ 5.4) (5:30)
Methodologies (OBJ 1.7 & 5.4) (2:52)
Security Controls (OBJ 5.1) (6:52)
** Types of Risk (OBJ 1.6 & 5.4) (7:12)
Quiz: Risk Assessments
Vulnerability Management
Vulnerability Management (OBJ 1.7, 4.1, & 5.4) (7:53)
Penetration Testing (OBJ 1.8) (4:29)
** Training and Exercises (OBJ 1.8 & 4.2 (4:48)
OVAL (OBJ 1.7) (1:37)
Vulnerability Assessment (OBJ 1.7 & 4.1) (6:55)
Demo: Nmap Scanning (OBJ 4.1) (8:53)
Demo: Vulnerability Scanning (OBJ 1.7, 4.1, & 4.3) (9:36)
Password Analysis (OBJ 1.2) (5:57)
Demo: Password Cracking (OBJ 4.1) (2:38)
Quiz: Vulnerability Management
Monitoring and Auditing
Monitoring Types (OBJ 3.3) (2:57)
Performance Baselining (OBJ 2.1) (4:37)
Protocol Analyzers (OBJ 3.3 & 4.1) (3:00)
SNMP (OBJ 3.1) (3:43)
Demo: Analytical Tools (OBJ 4.1) (4:29)
Auditing (OBJ 1.7) (1:57)
Demo: Auditing Files (OBJ 1.7) (3:56)
Logging (OBJ 1.7, 4.3, & 4.5) (3:42)
Log Files (OBJ 4.3) (5:17)
SIEM (OBJ 1.7 & 4.3) (8:51)
** Syslog (OBJ 1.7 & 4.3) (5:52)
** SOAR (OBJ 1.7 & 4.4) (3:20)
Quiz: Monitoring and Auditing
Cryptography
Cryptography (OBJ 2.1 & 2.8) (4:58)
Symmetric vs Asymmetric (OBJ 2.8) (6:14)
Symmetric Algorithms (OBJ 2.8) (4:59)
Public Key Cryptography (OBJ 2.8) (3:12)
Asymmetric Algorithms (OBJ 2.8) (3:47)
Pretty Good Privacy (OBJ 2.8) (1:49)
Key Management (OBJ 2.8) (2:14)
One-Time Pad (OBJ 2.8) 4min (4:21)
Demo: Steganography (OBJ 2.8) (3:54)
** Cryptography Considerations (OBJ 2.8) (12:26)
Quiz: Cryptography
Hashing
Hashing (OBJ 1.2, 2.8 & 3.2) (8:31)
Demo: Hashing(OBJ 2.8) (3:07)
Hashing Attacks (OBJ 1.2,1.3, & 2.8) (3:17)
Increasing Hash Security (OBJ 2.8 & 3.7) (1:29)
Quiz: Hashing
Public Key Infrastructure
Public Key Infrastructure (OBJ 3.1, 3.3, & 3.9) (3:56)
Digital Certificates (OBJ 3.9) (6:45)
Demo: Certificates (OBJ 2.8 & 3.9) (3:33)
Certificate Authorities (OBJ 3.2 & 3.9) (4:15)
Web of Trust (OBJ 3.9) (2:38)
Quiz: Public Key Infrastructure
Security Protocols
Security Protocols (OBJ 3.1) (0:24)
S/MIME (OBJ 3.1) (1:32)
SSL and TLS (OBJ 1.2, 2.1, 3.1, & 3.3) (5:38)
SSH (OBJ 3.1 & 4.1) (2:31)
VPN Protocols (OBJ 3.1 & 3..3) (6:40)
Demo: Setting Up a VPN (OBJ 3.3) (1:37)
Quiz: Security Protocols
Planning for the Worst
Planning for the Worst (OBJ 2.5 & 5.4) (2:13)
Redundant Power (OBJ 2.5) (3:10)
Backup Power (OBJ 2.5) (3:08)
Data Redundancy (OBJ 2.5) (4:42)
Demo: RAIDs (OBJ 2.5) (3:38)
Network Redundancy (OBJ 2.5) (2:07)
(OBJ 2.5 &3.3) (1:45)
Redundant Sites (OBJ 2.1) (2:23)
Data Backup (OBJ 2.5) (2:57)
Tape Rotation (OBJ 2.5) (3:55)
Disaster Recovery Plan (OBJ 2.1, 2.5, 4.2, & 5.4) (5:41)
** Business Impact Analysis (OBJ 5.4) (15:47)
Quiz: Planning for the Worst
Social Engineering
Social Engineering (OBJ 1.1) (0:55)
Demo: Pretexting (OBJ 1.1 & 5.3) (4:17)
Insider Threat (OBJ 1.5) (2:12)
Phishing (OBJ 1.1 & 5.3) (6:34)
** Motivation Factors (OBJ 1.1) (7:14)
More Social Engineering (OBJ 1.1 & 1.2) (4:03)
** Fraud and Scams (OBJ 1.1) (5:25)
** Influence Campaigns (OBJ 1.1) (4:14)
User Education (OBJ 5.3) (4:47)
Quiz: Social Engineering
Policies and Procedures
Policies and Procedures (OBJ 5.2 & 5.3) (5:55)
Data Classifications (OBJ 5.3 & 5.5) (6:45)
Data Ownership (4:06)
PII and PHI (OBJ 5.2 & 5.5) (6:22)
** Legal Requirements (OBJ 5.2 & 5.5) (5:45)
** Privacy Technologies (OBJ 5.5) (6:29)
Security Policies (OBJ 5.3 & 5.5) (10:22)
User Education (OBJ 5.3) (4:05)
Vendor Relationships (OBJ 5.3) (7:55)
Disposal Policies (OBJ 2.7 & 4.1) (5:07)
IT Security Frameworks (OBJ 5.2) (3:20)
** Key Frameworks (OBJ 5.2) (8:37)
Quiz: Policies and Procedures
Incident Response and Forensics
Incident Response Procedures (OBJ 4.2) (4:39)
** Incident Response Planning (OBJ 4.2) (18:19)
** Investigative Data (OBJ 4.3) (12:30)
** Forensic Procedures (OBJ 4.5) (13:55)
Data Collection Procedures (OBJ 4.1 & 4.5) (7:59)
Demo: Disk Imaging (OBJ 4.1) (6:59)
** Security Tools (OBJ 4.1) (21:03)
Quiz: Incident Response and Forensics
Conclusion
Conclusion (9:35)
Practice Exam
Full-length Practice Exam with Simulations
Worms (OBJ 1.2)
Download
Complete and Continue
Become a Member and Get
Unlimited Access
to 340+ Top Cyber Security Courses.
UPGRADE NOW