Autoplay
Autocomplete
Previous Lesson
Complete and Continue
CompTIA Security+ Certification (SY0-601): The Total Course
Training Overview
Description of Training
Video Overview (0:42)
Chapter 0: Introduction CompTIA Security+ (SY0-601)
Introduction (2:35)
About the Security+ (SY0-601) Exam (3:07)
Chapter 1: Risk Management
Defining Risk (8:23)
Threats and Vulnerabilities (7:04)
Threat Intelligence (10:59)
Risk Management Concepts (7:24)
Security Controls (9:22)
Risk Assessments and Treatments (5:44)
Quantitative Risk Assessments (6:38)
Qualitative Risk Assessments (3:54)
Business Imapct Analysis (9:18)
Data Types and Roles (11:29)
Security and the Information Life Cycle (9:03)
Data Destruction (6:04)
Personnel Risk and Policies (10:22)
Third-Party Risk Management (8:29)
Agreement Types (6:31)
Chapter 1 Exam Question Review (1:40)
Wiping Disks with the dd Command Lab (5:38)
Chapter 1 Ask Me Anything (AMA) (2:12)
Risk Management Quiz
Chapter 2: Cryptography
Cryptography Basics (15:56)
Data Protection (8:36)
Cryptographic Methods (7:19)
Symmetric Cryptosystems (12:42)
Symmetric Block Modes (8:15)
Asymmetric Cryptosystems (12:48)
Diffie-Hellman (6:35)
Hashing (8:42)
Understanding Digital Certificates (7:39)
Trust Models (4:45)
Public Key Infrastructure (3:39)
Certificate Types (14:10)
Touring Certificates (8:47)
Cryptographic Attacks (5:23)
Password Cracking (10:13)
Password Cracking Demo (6:08)
Chapter 2 Exam Question Review (2:27)
SSH Public Key Authentication Lab (9:03)
Chapter 2 Ask Me Anything (AMA) (1:44)
Cryptography Quiz
Chapter 3: Identity and Account Management
Identification, Authentication, and Authorization (8:01)
Enabling Multifactor Authentication (4:46)
Authorization (4:50)
Accounting (5:24)
Authentication Methods (14:06)
Access Control Schemes (6:50)
Account Management (13:05)
Network Authentication (9:04)
Identity Management Systems (5:52)
Chapter 3 Exam Question Review (2:15)
Creating LInux Users and Groups Lab (5:44)
Chapter 3 Ask Me Anything (AMA) (1:16)
Identity and Account Management Quiz
Chapter 4: Tools of the Trade
Touring the CLI (16:28)
Shells (6:17)
The Windows Command Line (4:36)
Microsoft PowerShell (12:33)
Linux Shells (11:48)
Python Scripts (7:25)
Windows Command-Line Tools (16:22)
Linux Command-Line Tools (9:35)
Network Scanners (5:14)
Network Scanning with Nmap (8:58)
Network Protocol Analyzers (8:01)
Using Wireshark to Analyze Network Traffic (9:04)
Using tcpdump to Analyze Network Traffic (8:16)
Log Files (8:56)
Centralized Logging (9:03)
Configuring Linux Log Forwarding (8:28)
Chapter 4 Exam Question Review (2:57)
Linux Shell Script Lab (7:09)
Nmap Lab (4:31)
Chapter 4 Ask Me Anything (AMA) (2:12)
Tools of the Trade Quiz
Chapter 5: Securing Individual Systems
Malware (13:42)
Weak Configurations (11:36)
Common Attacks (9:05)
Driver and Overflow Attacks (7:54)
Password Attacks (8:04)
Bots and Botnets (6:13)
Disk RAID Levels (10:19)
Securing Hardware (11:04)
Securing Endpoints (9:03)
Chapter 5 Exam Question Review (2:19)
Linux Software RAID Lab (7:31)
Chapter 5 Ask Me Anything (AMA) (1:44)
Securing Individual Systems Quiz
Chapter 6: The Basic LAN
The OSI Model (12:30)
ARP Cache Poisoning (8:45)
Other Layer 2 Attacks (5:22)
Network Planning (7:04)
Load Balancing (5:39)
Securing Network Access (6:23)
Honeypots (6:01)
Firewalls (11:17)
Proxy Servers (6:15)
Network and Port Address Translation (6:50)
IP Security (IPsec) (8:59)
Virtual Private Networks (VPNs) (10:07)
Intrusion Detection and Prevention Systems (IDS/IPS) (13:02)
Chapter 6 Exam Question Review (3:25)
Linux Snort IDS Lab (7:20)
Chapter 6 Ask Me Anything (AMA) (1:12)
The Basic LAN Quiz
Chapter 7: Securing Wireless LANs
Wi-Fi Encryption Standards (9:43)
RFID, NFC, and Bluetooth (6:50)
Wi-Fi Coverage and Performance (8:21)
Wi-Fi Discovery and Attacks (12:10)
Cracking WPA2 (10:24)
Wi-Fi Hardening (10:30)
Chapter 7 Exam Question Review (1:42)
WPA2 Cracking Lab (6:28)
Chapter 7 Ask Me Anything (AMA) (1:16)
Securing Wireless LANs Quiz
Chapter 8: Securing Public Servers
Defining a Public Server (0:45)
Common Attacks and Mitigations (9:47)
Containers and Software-Defined Networking (11:28)
Hypervisors and Virtual Machines (8:25)
Cloud Deployment Models (8:45)
Cloud Service Models (8:27)
Securing the Cloud (10:21)
Chapter 8 Exam Question Review (2:10)
Docker Container Lab (4:07)
Chapter 8 Ask Me Anything (AMA) (1:59)
Securing Public Servers Quiz
Chapter 9: Securing Dedicated Systems
Embedded Systems (13:19)
Industrial Control System (ICS) (6:43)
Internet of Things (IoT) Devices (10:04)
Connecting to Dedicated and Mobile Systems (10:52)
Security Constraints for Dedicated Systems (5:09)
Mobile Device Deployment and Hardening (11:03)
Chapter 9 Exam Question Review (2:34)
Smartphone Hardening Lab (2:31)
Chapter 9 Ask Me Anything (AMA) (2:13)
Securing Dedicated Systems Quiz
Chapter 10: Physical Security
Physical Security Overview (0:58)
Physical Security (9:52)
Keylogger Demo (4:44)
Environmental Controls (5:23)
Chapter 10 Exam Question Review (2:24)
Physical Security Lab (2:54)
Chapter 10 Ask Me Anything (AMA) (2:42)
Physical Security Quiz
Chapter 11: Secure Protocols and Applications
DNS Security (5:10)
FTP Packet Capture (3:29)
Secure Web and E-mail (11:58)
Request Forgery Attacks (4:56)
Cross-Site Scripting Attacks (7:16)
Web Application Security (8:02)
Web App Vulnerability Scanning (5:43)
Chapter 11 Exam Question Review (3:21)
OWASP ZAP Web App Scan Lab (4:24)
Chapter 11 Ask Me Anything (AMA) (2:00)
Secure Protocols and Applications Quiz
Chapter 12: Testing Infrastructure
Testing Infrastructure Overview (4:31)
Social Engineering (5:58)
Social Engineering Attacks (10:47)
Vulnerability Assessments (9:00)
Penetration Testing (9:47)
Security Assessment Tools (11:38)
The Metasploit Framework (8:09)
Chapter 12 Exam Question Review (1:46)
hping3 Forged Packet Lab (6:05)
Chapter 12 Ask Me Anything (AMA) (1:41)
Testing Infrastructure Quiz
Chapter 13: Dealing with Incidents
Incident Response Overview (2:58)
Incident Response Plans (IRPs) (6:01)
Threat Analysis and Mitigating Actions (7:40)
Digital Forensics (12:14)
Gathering Digital Evidence (9:44)
Business Continuity and Alternate Sites (6:11)
Data Backup (9:45)
Chapter 13 Exam Question Review (0:59)
Autopsy Forensic Browser Lab (4:58)
Chapter 13 Ask Me Anything (AMA) (2:12)
Dealing with Incidents Quiz
Log Files
Lesson content locked
If you're already enrolled,
you'll need to login
.
Enroll in Course to Unlock