Autoplay
Autocomplete
Previous Lesson
Complete and Continue
CompTIA Security+ SY0-701: General Security Concepts
Training Overview
Description of Training
Video Overview (1:46)
Section 1: Comptia Security+ 701 Course Introduction
1. Cyber Security 2024 Forecast (1:46)
2. Course & Author Introduction (2:06)
3. Comptia Security+ 701 Course Introduction - Volume I - Trailer (0:33)
Section 2: Compare and contrast various types of security controls
1. Chapter Introduction (2:28)
2. Technical Controls (4:12)
3. Managerial controls (5:20)
4. Operations Controls (5:17)
5. Physical Controls (3:31)
6. Control Types Introduction (2:39)
7. Preventive Control types (2:10)
8. Deterrent Controls (2:58)
9. Detective Controls (3:41)
10. What are organizations doing to implement Detective controls (9:21)
11. Corrective control (3:43)
12. Compensating Control (3:03)
13. Directive Controls (3:28)
Quiz 1: Milestone Check - Quiz 01
Quiz 2: Milestone Check - Quiz 02
Section 3: Summarize Fundamental Security Concepts
1. CIA triad Introduction (1:39)
2. Confidentiality (3:09)
3. Integrity (3:13)
4. Availability (2:43)
5. Non-Repudiation (8:45)
6. AAA (4:55)
7. Gap Analysis in Cyber Security (6:15)
8. Zero Trust - Control Plane (3:44)
9. Zero Trust - Data Plane
10. Physical Security (5:09)
11. Physical Controls - Sensors (4:24)
12. Deception and Disruption Technologies (4:18)
Quiz 3: Milestone Check - Quiz 03
Quiz 4: Milestone Check - Quiz 04
Section 4: Various types of Change Management Processes and their impact on Cyber Security
1. Chapter Introduction (1:01)
2. Approval Process (4:48)
3. Ownership (3:13)
4. Stakeholders (3:15)
5. Impact Analysis (4:00)
6. Test Results (3:19)
7. Backout Plans (2:56)
8. Maintenance Window (3:36)
9. Standard Operating Procedures (4:16)
10. Technical Implications (5:13)
11. Documentation (3:38)
12. Version Control (3:28)
Quiz 5: Milestone Check - Quiz 05
Quiz 6: Milestone Check - Quiz 06
Section 5: The importance of using appropriate cryptographic solutions
1. Chapter Introduction (2:59)
2. Chocolate Cake Recipe - PKI Example 1 (3:20)
3. The digital treasure - PKI Example 2 (3:23)
4. Browser to Webserver- E2E Encryption (12:13)
5. PKI (5:11)
6. Encryption - What will we learn (1:55)
7. Encryption Levels (4:52)
8. Transport Encryption (4:35)
9. Symmetric Encryption (4:45)
10. Asymmetric Encryption (3:54)
11. Key exchange - Part 1 (8:47)
12. Key Exchange Algorithms - Part 2 (5:48)
13. Encryption Key Lengths (5:00)
14. Encryption and PKI Tools Introduction (0:40)
15. TPM (3:53)
16. HSM (3:47)
17. KMS (3:36)
18. Secure Enclaves (3:31)
19. Obfuscation (2:41)
20. Steganography (3:04)
21. Tokenization (3:19)
22. Data Masking (3:20)
23. Data Masking Types (2:48)
24. Masking Techniques (2:54)
25. Hashing Introduction - What are Hash Functions (3:14)
26. Real word usage of Hash Functions (3:09)
27. Journey of Hashing Algorithm (3:35)
28. Strengths & Weaknesses of Hashing Algorithms (3:43)
29. Using Right Hashing Algorithms (3:05)
30. Hashing Vulnerabilities and Historical Exploits (2:29)
31. Salting (3:09)
32. Salting Under the hood (4:45)
33. Definition and basic concept & History of digital signatures (2:54)
34. The importance of digital signatures in modern communication (3:09)
35. The cryptographic principles behind digital signatures (4:20)
36. The process of creating and verifying a digital signature (3:51)
37. How digital signatures ensure the integrity and non-repudiation of data (4:02)
38. Common algorithms used for digital signatures (4:28)
39. Digital signature standards (3:23)
40. Advanced cryptographic concepts related to digital signatures (4:37)
41. Key stretching (2:15)
42. Contributors in the field of Key stretching (2:21)
43. Blockchain - Introduction (3:33)
44. Blockchain as a decentralized digital ledger (2:21)
45. Adoption of block chain (3:49)
46. The Dawn of Internet Security and the Rise of Digital Certificates (4:51)
47. A brief history of cryptographic methods (4:03)
48. The introduction of SSL by Netscape (3:58)
49. How SSL became the standard for securing internet communications (4:08)
50. Why SSL evolved into TLS (2:30)
51. Poodle Attack (4:26)
52. Key improvements and differences between SSL and TLS protocols (3:50)
53. Versions of TLS and their Enhancements (5:11)
54. Certificate Authorities and their history (4:23)
55. Understanding Types of CAs - Public vs. Private (3:16)
56. Hierarchical Trust Model - Example (5:25)
57. Hierarchical Trust Model - Overview and Best Practices (5:07)
58. What is a Root CA (6:03)
59. The Need for Intermediate Certificate Authorities (6:18)
60. What are CRL-s (2:34)
61. The need for OCSP-s (2:54)
62. How does the browser identify the OCSP Server (3:59)
63. What are Self Signed Certificates (2:49)
64. What are Third party Certificates (3:32)
65. What is a CSR What are its Key Components (5:11)
66. Wild Card Certificates (3:11)
67. Buying a domain - Lab (3:04)
68. Building a Linux VM (2:24)
69. Mapping A record in DNS (1:49)
70. Configuring the webserver with LetsEncrypt certificate (5:28)
71. Verifying the LetsEncrypt Certificate chain of Trust (4:02)
72. Certbot Supporting and helpful commands (4:23)
73. It-s LAB Time - What next - Step by Step - Verifying SELF SIGNED KEYS (12:31)
Section 6: Module Summary
1. Module Summary (2:19)
Next Steps & Certification
How to Book Your CompTIA Exam (Voucher Info)
Audio Version of Training
Audio Download
45. Adoption of block chain
Lesson content locked
If you're already enrolled,
you'll need to login
.
Enroll in Course to Unlock