Autoplay
Autocomplete
Previous Lesson
Complete and Continue
CompTIA Security+ Complete Course Part 1
Training Overview
Description of Training
Overview of Security
Welcome (5:34)
Overview of Security (2:58)
CIA Triad (3:57)
AAA of Security (OBJ 2.4) (3:08)
Security Threats (OBJ 1.1 & 1.2) (2:59)
Mitigating Threats (OBJ 5.1) (2:49)
Hackers (4:56)
Threat Actors (3:15)
** Threat Intelligence and Sources (OBJ 1.5) (8:55)
** Threat Hunting (OBJ 1.7) (6:54)
** Attack Frameworks (OBJ 4.2) (11:13)
Quiz: Overview of Security
Malware
Malware (OBJ 1.2) (0:42)
Viruses (OBJ 1.2) (6:23)
Worms (OBJ 1.2) (2:12)
Trojans (OBJ 1.2) (2:51)
Demo: Viruses and Trojans (OBJ 1.2) (6:18)
Ransomware (OBJ 1.2) (2:33)
Spyware (OBJ 1.2) (2:42)
Rootkits (OBJ 1.2 & 1.3) (3:32)
Spam (OBJ 1.1) (2:59)
Summary of Malware (2:05)
Quiz: Malware
Malware Infections
Malware Infections (4:15)
Common Delivery Methods (OBJ 1.1 & 1.5) (4:29)
Demo Phishing (OBJ 1.1 & 5.3) (5:22)
Botnets and Zombies (OBJ 1.2 & 1.4) (3:33)
Active Interception and Privilege Escalation (OBJ 1.3 & 1.4) (2:31)
Demo Privilege Escalation (OBJ 1.3 & 1.8) (5:44)
Backdoors and Logic Bombs (OBJ 1.2) (3:51)
Symptoms of Infection (OBJ 1.2) (4:13)
Removing Malware (OBJ 4.2) (5:04)
Preventing Malware (OBJ 1.6 & 3.2) (5:59)
** Malware Exploitation (OBJ 1.2 & 1.4) (7:38)
Quiz: Malware Infection
Security Applications and Devices
Security Applications and Devices (0:35)
Software Firewalls (OBJ 3.2) (4:18)
Demo: Software Firewalls (OBJ 3.2) (6:47)
IDS (OBJ 3.2 & 3.3) (5:05)
Pop-up Blockers (OBJ 1.1, 3.3, 4.4) (3:12)
Data Loss Prevention (DLP) (OBJ 2.1, 3.2, 4.4) (3:46)
Securing the BIOS (OBJ 3.2) (3:58)
Securing Storage Devices (OBJ 2.1, 2.5, & 3.3) (3:29)
Disk Encryption (OBJ 2.1, 2.8 & 3.2) (4:54)
** Endpoint Analysis (OBJ 3.1 & 3.3) (5:47)
Quiz: Security Applications and Devices
Mobile Device Security
Mobile Device Security (OBJ 1.5) (1:17)
Securing Wireless Devices (OBJ 3.4 & 3.5) (1:33)
Mobile Malware (OBJ 1.1 & 3.5) (6:21)
SIM Cloning & ID Theft (OBJ 1.1, 2.4, & 2.6) (4:03)
Bluetooth Attacks (OBJ 1.4 & 3.4) (2:11)
Mobile Device Theft (OBJ 3.5) (3:13)
Security of Apps (OBJ 3.1 & 3.5) (5:09)
BYOD (OBJ 3.5) (4:59)
Hardening Mobile Devices (OBJ 3.5) (3:54)
Quiz: Mobile Device Security
Hardening
Hardening (OBJ 3.2) (1:50)
Unnecessary Applications (OBJ 1.6) (3:14)
Restricting Applications (OBJ 3.2 & 4.4) (2:59)
Demo: Unnecessary Services (OBJ 3.2 & 3.3) (5:38)
Trusted Operating System (OBJ 3.2) (1:59)
Updates and Patches (OBJ 1.6 & 3.2) (3:29)
Patch Management (OBJ 1.6 & 3.2) (3:52)
Group Policies (OBJ 2.1) (2:36)
Demo: Group Policies (OBJ 3.2) (4:09)
File Systems and Hard Drives (OBJ 2.1 & 3.2) (3:21)
Quiz: Hardening
Supply Chain Management
** Supply Chain Assessment (OBJ 1.2, 1.5, & 1.6) (5:25)
** Root of Trust (OBJ 3.2) (4:36)
** Trusted Firmware (OBJ 3.2) (4:55)
** Secure Processing (OBJ 3.2) (4:03)
Quiz: Supply Chain Management
Virtualization
Virtualization (OBJ 2.2) (2:10)
Hypervisors (OBJ 2.2) (2:40)
How to create a VM (OBJ 2.2) (4:41)
Threats to VMs (OBJ 2.2) (3:46)
Securing VMs (OBJ 2.2) (3:50)
Demo: Securing VMs (4:43)
Quiz: Virtualization
Data Loss Prevention (DLP) (OBJ 2.1, 3.2, 4.4)
Lesson content locked
If you're already enrolled,
you'll need to login
.
Enroll in Course to Unlock