Autoplay
Autocomplete
Previous Lesson
Complete and Continue
CompTIA Security+ Complete Course Part 2
Training Overview
Description of Training
Application Security
Application Security (1:46)
Web Browser Security (OBJ 3.2 & 3.3) (6:42)
Web Browser Concerns (OBJ 3.2 & 3.3) (3:22)
Demo Web Browser Configuration (OBJ 3.2 & 3.3) (5:22)
Securing Applications (OBJ 1.4 & 3.2) (4:52)
Quiz: Application Security
Secure Software Development
Software Development (OBJ 2.1 & 2.3) (8:37)
SDLC Principles (OBJ 1.6, 2.3, 3.2, & 5.3) (6:25)
Testing Methods (OBJ 2.3 & 3.2) (7:02)
Software Vulnerabilities and Exploits (OBJ 1.2, 1.3, & 1.6) (3:47)
Buffer Overflows (OBJ 1.3) (6:18)
Demo: Buffer Overflow Attack (OBJ 1.3) (6:28)
XSS and XSRF (OBJ 1.3) (3:10)
SQL Injection (OBJ 1.3) (6:28)
Demo: SQL Injection (OBJ 1.2 & 1.3) (7:16)
** XML Vulnerabilities (OBJ 1.3) (5:10)
** Race Conditions (OBJ 1.3) (5:50)
** Design Vulnerabilities (OBJ 1.3) (4:16)
Quiz: Secure Software Development
Network Design
Network Security (0:47)
OSI Model (OBJ 3.3 & 3.6) (6:03)
Switches (OBJ 1.4 & 2.7) (3:35)
Routers (OBJ 3.3) (2:30)
Network Zones (OBJ 3.3) (3:29)
** Jumpbox (OBJ 3.5) (5:03)
Network Access Control (NAC) (OBJ 3.3 & 4.4) (2:43)
VLANs (OBJ 3.3) (1:32)
Subnetting (OBJ 3.6) (1:53)
Network Address Translation (OBJ 3.3) (2:35)
Telephony Devices (OBJ 3.1) (6:00)
Quiz: Network Design
Perimeter Security
Perimeter Security (0:49)
Firewalls (OBJ 3.3 & 4.4) (8:04)
Demo: SOHO Firewall (OBJ 3.3 & 4.4) (4:07)
Proxy Servers (OBJ 3.3 & 4.4) (4:15)
Honeypots and Honeynets (OBJ 2.1) (1:24)
Data Loss Prevention (OBJ 2.1, 3.2, & 4.4) (1:37)
NIDS vs NIPS (OBJ 3.3) (4:13)
Unified Threat Management (OBJ 3.2 & 3.3) (1:55)
Quiz: Perimeter Security
Cloud Security
Cloud Computing (OBJ 1.5, 2.2, 3.5, & 3.6) (3:32)
Cloud Types (OBJ 2.2 & 3.6) (2:54)
As a Service (OBJ 2.2) (7:07)
Cloud Security (OBJ 2.5 & 3.6) (2:28)
Defending Servers (OBJ 1.7, 3.1, and 3.2) (4:35)
** Cloud-based Infrastructure (OBJ 1.2, 1.6, 2.2, 2.4, 2.5, & 3.6) (7:22)
** CASB (OBJ 2.1) (4:28)
** API (OBJ 2.1) (6:09)
** FAAS and Serverless (OBJ 2.2) (8:08)
** Cloud Threats (OBJ 1.3, 1.6, 2.1, & 2.2) (8:11)
Quiz: Cloud Security
Automation
Workflow Orchestration (OBJ 2.3) (3:59)
CI_CD (OBJ 2.3) (7:05)
DevSecOps (OBJ 2.3) (4:51)
IAC (OBJ 2.2) (4:22)
Machine Learning (OBJ 1.2) (8:30)
Network Attacks
Network Attacks (OBJ 1.4) (0:40)
Ports and Protocols (OBJ 3.1) (4:27)
Memorization of Ports (OBJ 3.1) (11:33)
Unnecessary Ports(OBJ 1.6 & 3.2) (3:24)
Denial of Service (OBJ 1.3 & 1.4) (7:58)
DDoS (OBJ 1.2, 1.3, & 1.4) (1:39)
Stopping a DDoS (OBJ 2.1 & 2.3) (2:29)
Spoofing (OBJ 1.4 & 3.3) (1:19)
Hijacking (OBJ 1.3 & 1.4) (3:47)
Replay Attack (OBJ 1.3) (1:29)
Demo: Null Sessions (OBJ 1.6) (2:27)
Transitive Attacks (OBJ 2.4) (1:27)
DNS Attacks (OBJ 1.1, 1.4 & 3.1) (4:36)
ARP Poisoning (OBJ 1.4) (1:33)
Quiz: Network Attacks
Securing Networks
Securing Networks (OBJ 3.3) (0:52)
Securing Network Devices (OBJ 1.2, 1.6, 3.3, & 3.7) (6:45)
Securing Network Media (OBJ 2.7) (8:51)
Securing WiFi Devices (OBJ 1.4 & 3.4) (4:25)
Wireless Encryption (OBJ 1.6 & 3.4) (5:33)
Wireless Access Points (OBJ 1.4 & 3.4) (6:14)
Wireless Attacks (OBJ 1.2, 1.4 & 1.8) (4:18)
Demo: Wireless Attack (OBJ 1.4) (7:42)
** WPA3 (OBJ 3.4) (6:08)
Other Wireless Technologies (OBJ 1.4 & 3.5) (6:05)
Quiz: Securing Networks
Application Security
Lesson content locked
If you're already enrolled,
you'll need to login
.
Enroll in Course to Unlock