Autoplay
Autocomplete
Previous Lesson
Complete and Continue
CompTIA Security+ Certification (SY0-701): The Total Course
Training Overview
Description of Training
About the Security+
Introduction to the CompTIA Security+ (SY 0-701) Exam Prep Course (3:05)
About the CompTIA Security+ (SYO-701) Exam (8:00)
How to Take Your CompTIA Security+ (SYO-701) Exam (8:44)
Chapter 1 - Risk Management
Defining Business Risk (5:12)
Threat Actors, Part 1 (4:37)
Threat Actors, Part 2 (2:29)
Threat Intelligence (10:49)
Risk Management Concepts (7:18)
Security Controls (9:13)
Risk Assessments and Treatments (5:38)
Quantitative Risk Assessments (6:31)
Qualitative Risk Assessments (3:49)
Security and the Information Life Cycle (8:58)
Data Destruction (5:58)
Chapter 1 Exam Question Review (1:46)
Wiping Disks with the dd Command Lab (5:44)
Chapter 1 Ask Me Anything (AMA) (2:19)
Chapter 1 Quiz
Chapter 2 - Foundations of Cryptography
Cryptography Basics (15:46)
Hashing (8:31)
Cryptographic Attacks (5:12)
Password Cracking (10:02)
Password Cracking Demo (6:15)
Chapter 2 Exam Question Review (2:33)
SSH Public Key Auth Lab (9:09)
Chapter 2 Ask Me Anything (AMA) (1:50)
Chapter 2 Quiz
Chapter 3 - Physical Security
Physical Security Overview (1:05)
Physical Security (9:48)
Keylogger Demo (4:51)
Environmental Controls (5:22)
Chapter 03 Exam Question Review (2:31)
Physical Security Lab (3:00)
Chapter 3 Ask Me Anything (AMA) (2:49)
Chapter 3 Quiz
Chapter 4 - Identity and Account Management
Identification, Authentication, and Authorization (7:54)
Enabling Multifactor Authentication (4:43)
Authorization (4:48)
Accounting (5:21)
Authentication Methods (14:00)
Access Control Schemes (6:45)
Account Management (12:57)
Network Authentication (8:56)
Identity Management Systems (5:50)
Chapter 04 Exam Question Review (2:22)
Creating Linux Users Groups Lab (5:51)
Chapter 4 Ask Me Anything (AMA) (1:23)
Chapter 4 Quiz
Chapter 5 - Tools of the Trade
Touring The CLI (16:03)
Shells (6:00)
The Windows Command Line (4:30)
Microsoft Powershell (12:22)
Linux Shells (10:56)
Network Scanners (5:07)
Network Scanning With Nmap (8:57)
Network Protocol Analyzers (7:48)
Wireshark Analyze Network Traffic (8:53)
Tcpdump Analyze Network Traffic (8:16)
Log Files (8:33)
Centralized Logging (8:47)
Cybersecurity Benchmark Tools (5:34)
Configuring Linux Log Forwarding (8:20)
Chapter 05 Exam Question Review (3:04)
Linux Shell Script Lab (7:16)
Nmap Lab (4:38)
Chapter 5 Ask Me Anything (AMA) (2:19)
Chapter 5 Quiz
Chapter 6 - Securing Individual Systems
Malware (13:18)
Weak Configuration (11:28)
Common Attacks (9:00)
Overflow Attacks (5:51)
Password Attacks (7:58)
Bots and Botnets (6:09)
Disk RAID Levels (10:07)
Securing Hardware (10:56)
Securing Endpoints (8:52)
Securing Data With Encryption (6:27)
Chapter 06 Exam Question Review (2:25)
Linux Software Raid Lab (7:38)
Secure Enclave Lab (3:36)
Chapter 6 Ask Me Anything (AMA) (1:50)
Chapter 06 Quiz
Chapter 7 - Securing the Basic LAN
Data Protection (9:29)
Cryptographic Methods (7:10)
Symmetric Cryptosystems (12:35)
Symmetric Block Modes (8:02)
Asymmetric Cryptosystems (12:41)
Understanding Digital Certificates (7:35)
Trust Models (4:42)
Public Key Infrastructure (3:28)
Certificate Types (14:03)
Touring Certificates (7:58)
Network Architecture Planning (3:38)
OSI Model (12:37)
ARA Cache Poisoning (8:37)
Other Layer 2 Attacks (5:13)
Network Planning (7:00)
Zero Trust Network Access (ZTNA) 2.0 (9:39)
Load Balancing (6:08)
Securing Network Access (6:14)
Honeypots (5:58)
Static and Dynamic Code Analysis (4:41)
Firewalls (11:15)
Proxy Servers (6:10)
Web Filtering (5:13)
Network And PAT (6:44)
IP Security (8:48)
SD-WAN And SASE (3:04)
Virtual Private Networks (9:55)
Intrusion Detection Prevention Systems (IDS/IPS) (12:56)
Chapter 07 Exam Question Review (3:32)
Linux Snort IDS Lab (7:27)
Chapter 7 Ask Me Anything (AMA) (1:19)
Chapter 07 Quiz
Chapter 8 - Securing Wireless LANs
Wi-Fi Encryption Standards (9:31)
RFID, NFC and Bluetooth (6:40)
Wi-Fi Coverage and Performance (8:11)
Wi-Fi Discovery and Attacks (12:02)
Cracking WPA2 (10:19)
Wi-Fi Hardening (10:21)
Ch 08 Exam Question Review (1:48)
WPA2 Cracking Lab (6:34)
Chapter 8 Ask Me Anything (AMA) (1:23)
Chapter 08 Quiz
Chapter 9 - Securing Virtual and Cloud Environments
Defending Public Servers (0:51)
Common Attacks And Mitigations (9:41)
DDoS Attacks In The Real World (2:40)
Containers and Soft-Defined Networking (11:22)
Hypervisors and Virtual Machines (8:18)
Cloud Deployment Models (8:40)
Cloud Service Models (8:21)
Securing the Cloud (10:11)
Chapter 09 Exam Question Review (2:17)
Docker Container Lab (4:14)
Chapter 9 Ask Me Anything (AMA) (2:06)
Chapter 09 Quiz
Chapter 10 - Securing Dedicated and Mobile Systems
Industrial Control System (ICS) (6:38)
Internet of Things (IoT) Devices (10:00)
Connecting to Dedicated and Mobile Systems (10:45)
Security Constraints for Dedicated Systems (5:04)
Mobile Device Deployment and Hardening (10:59)
Chapter 10 Exam Question Review (2:39)
Smartphone Hardening Lab (2:38)
Embedded Systems (12:59)
Chapter 10 Ask Me Anything (AMA) (2:20)
Chapter 10 Quiz
Chapter 11 - Secure Protocols and Applications
DNS Security (5:02)
FTP Packet Capture (3:25)
Secure Web and Email (11:37)
Request Forgery Attacks (4:47)
Cross-Site Scripting Attacks (7:04)
Web Application Security (5:15)
OWASP Top 10 (11:45)
Web App Vulnerability Scanning (5:50)
Chapter 11 Exam Question Review (3:28)
OWASP ZAP Web App Scan Lab (4:29)
Chapter 11 Ask Me Anything (AMA) (2:07)
Chapter 11 Quiz
Chapter 12 - Testing Infrastructure
Testing Infrastructure Overview (4:37)
Social Engineering Attacks (5:30)
Vulnerabilitiy Assessments (8:49)
Penetration Testing (9:36)
The Metasploit Framework (7:58)
Chapter 12 Exam Question Review (1:52)
Chapter 12 Ask Me Anything (AMA) (1:47)
Chapter 12 Quiz
Chapter 13 - Business Security Impact
Intro To Business Security (5:59)
Business Impact Analysis (9:10)
Data Types and Roles (11:21)
Personnel Risk and Policies (10:17)
Attestation (3:19)
Internal Audits and Assessments (5:25)
External Audits and Assessments (6:18)
Third-Party Risk Management (8:21)
Agreement Types (6:21)
Change Management (4:07)
Technical Change Management (7:03)
What Is Auto and Orchestration (3:46)
Benefits of Auto and Orchestration (2:53)
Use Cases of Auto and Orchestration (7:31)
Other Considerations of Auto and Orchestration (5:28)
Putting It All Together (6:06)
Exploring The NIST Frameworks (7:36)
Chapter 13 Quiz
Chapter 14 - Dealing with Incidents
Incident Response Overview (3:05)
Incident Response Plans (IRPs) (5:52)
IRP Testing (5:45)
Threat Analysis Mitigating Actions (7:33)
Digital Forensics (5:05)
Business Continuity and Alternate Sites (6:08)
Data Backup (9:37)
Chapter 14 Exam Question Review (1:05)
Autopsy Forensic Browser Lab (5:04)
Chapter 14 Ask Me Anything (AMA) (2:19)
Chapter 14 Quiz
Practice Questions
Practice Questions: CompTIA Security+
Audio Version of Training
Audio Download
Defining Business Risk
Download
Complete and Continue
Become a Member and Get
Unlimited Access
to 340+ Top Cyber Security Courses.
UPGRADE NOW