Autoplay
Autocomplete
Previous Lesson
Complete and Continue
CompTIA Security+ SY0-701: General Security Concepts
Training Overview
Description of Training
Video Overview (1:46)
Section 1: Comptia Security+ 701 Course Introduction
1. Cyber Security 2024 Forecast (1:46)
2. Course & Author Introduction (2:06)
3. Comptia Security+ 701 Course Introduction - Volume I - Trailer (0:33)
Section 2: Compare and contrast various types of security controls
1. Chapter Introduction (2:28)
2. Technical Controls (4:12)
3. Managerial controls (5:20)
4. Operations Controls (5:17)
5. Physical Controls (3:31)
6. Control Types Introduction (2:39)
7. Preventive Control types (2:10)
8. Deterrent Controls (2:58)
9. Detective Controls (3:41)
10. What are organizations doing to implement Detective controls (9:21)
11. Corrective control (3:43)
12. Compensating Control (3:03)
13. Directive Controls (3:28)
Quiz 1: Milestone Check - Quiz 01
Quiz 2: Milestone Check - Quiz 02
Section 3: Summarize Fundamental Security Concepts
1. CIA triad Introduction (1:39)
2. Confidentiality (3:09)
3. Integrity (3:13)
4. Availability (2:43)
5. Non-Repudiation (8:45)
6. AAA (4:55)
7. Gap Analysis in Cyber Security (6:15)
8. Zero Trust - Control Plane (3:44)
9. Zero Trust - Data Plane (3:44)
10. Physical Security (5:09)
11. Physical Controls - Sensors (4:24)
12. Deception and Disruption Technologies (4:18)
Quiz 3: Milestone Check - Quiz 03
Quiz 4: Milestone Check - Quiz 04
Section 4: Various types of Change Management Processes and their impact on Cyber Security
1. Chapter Introduction (1:01)
2. Approval Process (4:48)
3. Ownership (3:13)
4. Stakeholders (3:15)
5. Impact Analysis (4:00)
6. Test Results (3:19)
7. Backout Plans (2:56)
8. Maintenance Window (3:36)
9. Standard Operating Procedures (4:16)
10. Technical Implications (5:13)
11. Documentation (3:38)
12. Version Control (3:28)
Quiz 5: Milestone Check - Quiz 05
Quiz 6: Milestone Check - Quiz 06
Section 5: The importance of using appropriate cryptographic solutions
1. Chapter Introduction (2:59)
2. Chocolate Cake Recipe - PKI Example 1 (3:20)
3. The digital treasure - PKI Example 2 (3:23)
4. Browser to Webserver- E2E Encryption (12:13)
5. PKI (5:11)
6. Encryption - What will we learn (1:55)
7. Encryption Levels (4:52)
8. Transport Encryption (4:35)
9. Symmetric Encryption (4:45)
10. Asymmetric Encryption (3:54)
11. Key exchange - Part 1 (8:47)
12. Key Exchange Algorithms - Part 2 (5:48)
13. Encryption Key Lengths (5:00)
14. Encryption and PKI Tools Introduction (0:40)
15. TPM (3:53)
16. HSM (3:47)
17. KMS (3:36)
18. Secure Enclaves (3:31)
19. Obfuscation (2:41)
20. Steganography (3:04)
21. Tokenization (3:19)
22. Data Masking (3:20)
23. Data Masking Types (2:48)
24. Masking Techniques (2:54)
25. Hashing Introduction - What are Hash Functions (3:14)
26. Real word usage of Hash Functions (3:09)
27. Journey of Hashing Algorithm (3:35)
28. Strengths & Weaknesses of Hashing Algorithms (3:43)
29. Using Right Hashing Algorithms (3:05)
30. Hashing Vulnerabilities and Historical Exploits (2:29)
31. Salting (3:09)
32. Salting Under the hood (4:45)
33. Definition and basic concept & History of digital signatures (2:54)
34. The importance of digital signatures in modern communication (3:09)
35. The cryptographic principles behind digital signatures (4:20)
36. The process of creating and verifying a digital signature (3:51)
37. How digital signatures ensure the integrity and non-repudiation of data (4:02)
38. Common algorithms used for digital signatures (4:28)
39. Digital signature standards (3:23)
40. Advanced cryptographic concepts related to digital signatures (4:37)
41. Key stretching (2:15)
42. Contributors in the field of Key stretching (2:21)
43. Blockchain - Introduction (3:33)
44. Blockchain as a decentralized digital ledger (2:21)
45. Adoption of block chain (3:49)
46. The Dawn of Internet Security and the Rise of Digital Certificates (4:51)
47. A brief history of cryptographic methods (4:03)
48. The introduction of SSL by Netscape (3:58)
49. How SSL became the standard for securing internet communications (4:08)
50. Why SSL evolved into TLS (2:30)
51. Poodle Attack (4:26)
52. Key improvements and differences between SSL and TLS protocols (3:50)
53. Versions of TLS and their Enhancements (5:11)
54. Certificate Authorities and their history (4:23)
55. Understanding Types of CAs - Public vs. Private (3:16)
56. Hierarchical Trust Model - Example (5:25)
57. Hierarchical Trust Model - Overview and Best Practices (5:07)
58. What is a Root CA (6:03)
59. The Need for Intermediate Certificate Authorities (6:18)
60. What are CRL-s (2:34)
61. The need for OCSP-s (2:54)
62. How does the browser identify the OCSP Server (3:59)
63. What are Self Signed Certificates (2:49)
64. What are Third party Certificates (3:32)
65. What is a CSR What are its Key Components (5:11)
66. Wild Card Certificates (3:11)
67. Buying a domain - Lab (3:04)
68. Building a Linux VM (2:24)
69. Mapping A record in DNS (1:49)
70. Configuring the webserver with LetsEncrypt certificate (5:28)
71. Verifying the LetsEncrypt Certificate chain of Trust (4:02)
72. Certbot Supporting and helpful commands (4:23)
73. It-s LAB Time - What next - Step by Step - Verifying SELF SIGNED KEYS (12:31)
Section 6: Module Summary
1. Module Summary (2:19)
Audio Version of Training
Audio Download
12. Deception and Disruption Technologies
Lesson content locked
If you're already enrolled,
you'll need to login
.
Enroll in Course to Unlock