Last updated 4/2022
MP4 | Video: h264, 1280×720 | Audio: AAC, 44.1 KHz
Language: English | Size: 2.42 GB | Duration: 10h 48m
CompTIA Security+ (Exam SY0-601)
What you’ll learn
Understand threats, attacks, and vulnerabilities
Analyze attacks
Learn about enterprise security architecture
Design authentication and authorization
Understand cloud and virtualization concepts
Secure application development and deployment
Implement physical security controls
Secure embedded and specialized systems
Learn about cryptographic concepts
Implement public key infrastructures
Implement secure networks
Implement secure mobile solutions
Implement secure hosts and identities
Use tools to assess security
Utilize data sources for investigation
Apply mitigation techniques
Learn about incident response and forensics
Understand governance, risk, and compliance
Requirements
The course starts with the basics of information and network security. Hence, no prior knowledge of information security is required. However, the candidates are expected to have a fair knowledge of basic networking and computing concepts such as system administration, network administration, TCP/IP, routing, switching etc.
In addition to this, the candidates are also recommended to have studied the CompTIA A+ certification course or possess the equivalent knowledge.
Description
Information and network security has become an important topic of discussion in recent times and the focus of almost every organization on information and network security is increasing with each passing day. This is primarily due to increased reliance on digital systems for day-to-day operations. There is a substantial amount of data residing on the digital systems that lures hackers and state actors towards illegally accessing and using it for monetary benefits and other political reasons.This course prepares the candidates to appear in the CompTIA Security+ (SY0-601) exam. The CompTIA Security+ exam is a foundational exam for aspiring information security professionals and enables them to understand different threats, analyze attacks, learn cryptography, implement secure networks, devise operational procedures, perform forensic analysis and more to ensure integrity and protection of sensitive data.This course also provides the basis to build on the knowledge gained and advance towards other professional certifications in the field of information and network security. This can be a great career move for young IT professionals to explore the in-demand network and information security arena. The CompTIA Security+ is the premier vendor-neutral security certification. This preparatory course for the CompTIA Security+ certification exam assures that the students completely learn and understand the exam topics of the latest SY0-601 exam version. The students will be able to demonstrate their knowledge of security concepts, tools, and procedures. It also confirms their ability to react to security incidents, and validates their skills in anticipating security risks and guarding against them. Overall, the course is very well designed to give a detailed overview of network and information security concepts and practical implications to the students. This helps them to appear in the CompTIA Security+ exam as well as polish their skills to improve their productivity in their jobs.
Overview
Section 1: Course Introduction
Lecture 1 Instructor Introduction
Lecture 2 Course Introduction
Section 2: Chapter 1 – Understanding Threats, Attacks, and Vulnerabilities
Lecture 3 Understanding Threats, Attacks, and Vulnerabilities
Lecture 4 Topic A: Introduction to Security Concepts
Lecture 5 Security Fundamentals
Lecture 6 Security Terms
Lecture 7 Topic B: Identifying Threat Actors and Vectors
Lecture 8 Actors and Threats
Lecture 9 Hackers
Lecture 10 Actor Attributes
Lecture 11 Attack Vectors
Lecture 12 Information Gathering
Lecture 13 Intelligence Sources
Lecture 14 Research Sources
Lecture 15 Demo – Research Sources
Lecture 16 Topic C: Understanding Vulnerabilities
Lecture 17 Vulnerability Fundamentals
Lecture 18 Security Impacts
Lecture 19 Vulnerability Types
Lecture 20 Vulnerability Types (cont.)
Lecture 21 Topic D: Understanding Attack Types
Lecture 22 Attack Types
Lecture 23 Understanding Malware Types
Lecture 24 Attacking Passwords and User Credentials
Lecture 25 Physical Attacks
Lecture 26 Other Attack Types
Lecture 27 Topic E: Identifying Social Engineering Techniques
Lecture 28 Social Engineering Principles
Lecture 29 Phishing
Lecture 30 Other Social Engineering Types
Lecture 31 Other Social Engineering Types (cont.)
Lecture 32 Chapter 1 Review
Section 3: Chapter 2 – Analyzing Attacks
Lecture 33 Analyzing Attacks
Lecture 34 Topic A: Security Assessment Tools and Techniques
Lecture 35 Understanding Assessments
Lecture 36 Threat Hunting
Lecture 37 Vulnerability Scanning
Lecture 38 Syslog and SIEM
Lecture 39 SIEM Components
Lecture 40 Topic B: Application Attacks
Lecture 41 Application Attacks
Lecture 42 Privilege Escalation
Lecture 43 Cross-Site Scripting
Lecture 44 Injections
Lecture 45 Application Attack Issues
Lecture 46 Session Attacks
Lecture 47 Additional Attacks
Lecture 48 Topic C: Network Attacks
Lecture 49 Introduction to Network Attacks
Lecture 50 Wireless Network Attacks
Lecture 51 Layer 2 Attacks
Lecture 52 Service Attacks
Lecture 53 Demo – DNS Poisoning
Lecture 54 Malicious Code
Lecture 55 Topic D: Penetration Testing
Lecture 56 Penetration Testing
Lecture 57 Environment Types
Lecture 58 Pentesting Concepts
Lecture 59 Network Reconnaissance
Lecture 60 Exercise Types
Lecture 61 Chapter 2 Review
Section 4: Chapter 3 – Architecture and Design
Lecture 62 Architecture and Design
Lecture 63 Topic A: Enterprise Security Architecture
Lecture 64 Enterprise Standardization Needs
Lecture 65 Configuration Management
Lecture 66 Data Protection
Lecture 67 Additional Security Concepts
Lecture 68 Disaster Recovery
Lecture 69 Deception and Disruption
Lecture 70 Topic B: Designing Authentication and Authorization
Lecture 71 Authentication and Authorization
Lecture 72 Authentication Methods
Lecture 73 Authentication Technologies
Lecture 74 Biometrics
Lecture 75 Multifactor Authentication
Lecture 76 Demo – Multifactor Authentication
Lecture 77 Topic C: Designing Resiliency
Lecture 78 Resiliency and Cybersecurity
Lecture 79 Redundancy Concepts
Lecture 80 Replication Concepts
Lecture 81 Backup Concepts
Lecture 82 Additional Resiliency Options
Lecture 83 Topic D: Cloud and Virtualization Concepts
Lecture 84 Cloud Models
Lecture 85 Cloud Types
Lecture 86 Cloud Service Providers
Lecture 87 Additional Cloud Concepts
Lecture 88 Additional Cloud Concepts (cont.)
Lecture 89 Demo – Cloud Computing Security
Lecture 90 Topic E: Securing Application Development and Deployment
Lecture 91 Application Development Environments
Lecture 92 Secure Coding Techniques
Lecture 93 Automation Techniques
Lecture 94 Application Design Concepts
Lecture 95 Chapter 3 Review
Section 5: Chapter 4 – Physical and System Security
Lecture 96 Physical and System Security
Lecture 97 Topic A: Physical Security Controls
Lecture 98 Importance of Physical Controls
Lecture 99 Standard Controls
Lecture 100 Security Monitoring
Lecture 101 Security Personnel
Lecture 102 Secure Areas
Lecture 103 Secure Data Destruction
Lecture 104 Demo – Data Destruction Software
Lecture 105 Topic B: Securing Embedded and Specialized Systems
Lecture 106 Embedded Systems
Lecture 107 Specialized Systems
Lecture 108 Additional System Types
Lecture 109 Communication Considerations
Lecture 110 Constraints
Lecture 111 Chapter 4 Review
Section 6: Chapter 5 – Cryptography
Lecture 112 Cryptography
Lecture 113 Topic A: Cryptographic Concepts
Lecture 114 Introduction to Cryptography
Lecture 115 Common Use Cases
Lecture 116 Integrity Verification
Lecture 117 Understanding Keys
Lecture 118 Crypto Limitations
Lecture 119 Quantum
Lecture 120 Additional Cryptographic Types
Lecture 121 Topic B: Public Key Infrastructures
Lecture 122 Introduction to PKIs
Lecture 123 Certificate Authorities
Lecture 124 Certificates
Lecture 125 Certificate Verification
Lecture 126 Certificate Formats
Lecture 127 Demo – Implementing PKI
Lecture 128 Additional Concepts
Lecture 129 Chapter 5 Review
Section 7: Chapter 6 – Implementing Secure Networks
Lecture 130 Implementing Secure Networks
Lecture 131 Topic A: Implement Secure Protocols
Lecture 132 Network Protocols
Lecture 133 Use Cases
Lecture 134 Application Layer Protocols
Lecture 135 IP Security
Lecture 136 Topic B: Implement Secure Network Designs
Lecture 137 Network Segmentation
Lecture 138 High Availability
Lecture 139 Virtual Private Networks
Lecture 140 Secure Network Appliances
Lecture 141 Firewalls
Lecture 142 Demo – Configuring a Host-Based Firewall
Lecture 143 Additional Network Security Concepts
Lecture 144 Topic C: Implementing Security in the Cloud
Lecture 145 Cloud Security Controls
Lecture 146 Cloud Storage Security
Lecture 147 Cloud Network Security
Lecture 148 Compute Security
Lecture 149 Additional Cloud Solutions
Lecture 150 Topic D: Implement Wireless Security
Lecture 151 Cryptographic Protocols
Lecture 152 Authentication Protocols
Lecture 153 Authentication Methods
Lecture 154 Installation Considerations
Lecture 155 Topic E: Implement Secure Mobile Solutions
Lecture 156 Deployment Models
Lecture 157 Connection Methods and Receivers
Lecture 158 Mobile Device Management (MDM)
Lecture 159 Mobile Devices
Lecture 160 Enforcement and Monitoring
Lecture 161 Additional Controls
Lecture 162 Chapter 6 Review
Section 8: Chapter 7 – Implementing Secure Hosts and Identities
Lecture 163 Implementing Secure Hosts and Identities
Lecture 164 Topic A: Implement Authentication and Authorization Systems
Lecture 165 Understanding Identity
Lecture 166 Access Control Methods
Lecture 167 Demo – Role-Based Access Control
Lecture 168 Authentication Management
Lecture 169 Remote Access Authentication
Lecture 170 Authentication and Authorization Protocols
Lecture 171 Topic B: Implement Identity and Account Management Controls
Lecture 172 Account Types
Lecture 173 Account Policies
Lecture 174 Demo – Configuring Account Policies
Lecture 175 Additional Identity Terms
Lecture 176 Topic C: Implement Host and Application Security Solutions
Lecture 177 Endpoint Protection
Lecture 178 Client Level Protections
Lecture 179 Network Level Protections
Lecture 180 Boot Integrity
Lecture 181 Database Security
Lecture 182 System Hardening
Lecture 183 Application Security
Lecture 184 Chapter 7 Review
Section 9: Chapter 8 – Operational Procedures
Lecture 185 Operational Procedures
Lecture 186 Topic A: Using Tools to Assess Security
Lecture 187 Network Reconnaissance and Discovery
Lecture 188 Network Tools
Lecture 189 Network Tools (cont.)
Lecture 190 Demo – Using Network Tools
Lecture 191 File Manipulation Tools
Lecture 192 Packet Capture and Relay
Lecture 193 Shell and Script Environments
Lecture 194 Forensics Tools
Lecture 195 Topic B: Utilizing Data Sources for Investigation
Lecture 196 Vulnerability Scan Output
Lecture 197 SIEM Dashboards
Lecture 198 Log Files
Lecture 199 Additional Monitoring
Lecture 200 Topic C: Applying Mitigation Techniques
Lecture 201 Reconfiguring Endpoint Solutions
Lecture 202 Configuration Changes
Lecture 203 Additional Mitigation Techniques
Lecture 204 Chapter 8 Review
Section 10: Chapter 9 – Incident Response and Forensics
Lecture 205 Incident Response and Forensics
Lecture 206 Topic A: Incident Response Policies and Procedures
Lecture 207 Incident Response Plans
Lecture 208 Incident Response Process
Lecture 209 Exercises
Lecture 210 Attack Frameworks
Lecture 211 Additional Plans
Lecture 212 Demo – Examining IRPs
Lecture 213 Topic B: Understanding Digital Forensics
Lecture 214 Introduction to Forensics
Lecture 215 Evidence Categories
Lecture 216 Documentation and Evidence
Lecture 217 Acquisition Concepts
Lecture 218 Integrity
Lecture 219 Additional Concepts
Lecture 220 Chapter 9 Review
Section 11: Chapter 10 – Governance, Risk, and Compliance
Lecture 221 Governance, Risk, and Compliance
Lecture 222 Topic A: Introduction to Control Types
Lecture 223 Security Controls
Lecture 224 Control Categories
Lecture 225 Control Types
Lecture 226 Topic B: Understanding Governance
Lecture 227 Introduction to Governance
Lecture 228 Regulations and Standards
Lecture 229 Key Frameworks
Lecture 230 Benchmarks
Lecture 231 Demo – Data Loss Prevention (DLP)
Lecture 232 Topic C: Implementing Security Policies
Lecture 233 Personnel-Based Policies
Lecture 234 Personnel-Based Policies (cont.)
Lecture 235 Third-Party Risk Management
Lecture 236 Data
Lecture 237 Credential Policies
Lecture 238 Topic D: Implementing Risk Management
Lecture 239 Risk Types
Lecture 240 Risk Management Strategies
Lecture 241 Risk Analysis
Lecture 242 Risk Analysis (cont.)
Lecture 243 Disasters
Lecture 244 Business Impact Analysis
Lecture 245 Topic E: Compliance with Privacy and Sensitive Data
Lecture 246 Organizational Consequences
Lecture 247 Data Types
Lecture 248 Privacy Enhancing Technologies
Lecture 249 Roles and Responsibilities
Lecture 250 Chapter 10 Review
Lecture 251 Course Closure
Section 12: Chapter 01 – Identifying Security Fundamentals
Lecture 252 Tokens
Lecture 253 Symmetric Encryption
Candidates looking to clear the CompTIA Security+ (SY0-601) certification exam,Information technology professionals,Information security personnel,Students of network and information security,Security analysts,SOC analysts and engineers
Homepage
https://www.udemy.com/course/comptia-security-exam-sy0-501-part-1-of-part-2/
DOWNLOAD FROM RAPIDGATOR.NET
DOWNLOAD FROM RAPIDGATOR.NET
DOWNLOAD FROM RAPIDGATOR.NET
DOWNLOAD FROM UPLOADGIG.COM
DOWNLOAD FROM UPLOADGIG.COM
DOWNLOAD FROM UPLOADGIG.COM
DOWNLOAD FROM NITROFLARE.COM
DOWNLOAD FROM NITROFLARE.COM
DOWNLOAD FROM NITROFLARE.COM