Home
:
Book details
:
Book description
Description of
CompTIA Security+ SY0-701 Full Course and Labs
Published 1/2024 MP4 | Video: h264, 1920x1080 | Audio: AAC, 44.1 KHz Language: English | Size: 47.83 GB | Duration: 25h 42m What you'll learn CompTIA Security+ exam objectives Attacks against networks Methods to protect a network Full length Mock Exam [b]Requirements[/b] Basics Networking and skills. [b]Description[/b] This course will prepare you to pass the CompTIA Security+ SY0-701 exam on the first try. In this course, I will be using my 20+ years of experience teaching IT courses to give you a practical, hands-on approach to all of the CompTIA Security+ Certification exams. I will cover all of the exam objectives in detail. I am a best-selling udemy instructor with over 300,000 students. I have helped thousands of students to pass their certification exams over the last 20 years. My method of teaching is engaging and fun.I will review how to build your own lab to follow along with me in this journey so you can gain the practical knowledge needed not only to pass your Security+ exam but also how to apply it in the real world of being an IT technician.This course will cover the following domains:Attacks, Threats, and VulnerabilitiesArchitecture and DesignImplementationOperations and Incident ResponseGovernance, Risk, and ComplianceThis course will include:Over 200 lectures.Over 25 Hours of training.We will only be covering the topics on your exam, no-nonsense and personal stories.PDF of the exam objectives from CompTIA for the Security+ exam. Certificate of completion. Lifetime access. 30-day money-back guarantee. Overview[ Section 1: Introduction Lecture 1 Exam Information Lecture 2 Exam Domains Lecture 3 Course Note Download Section 2: Lesson 1: IT Security Fundamentals Lecture 4 Introduction IT Security Fundamentals Lecture 5 CIA Triad OB 1.2 Lecture 6 Confidentiality OB 1.2 Lecture 7 Integrity OB 1.2 Lecture 8 Availability OB 1.2 Lecture 9 DAD Triade OB 1.2 Lecture 10 Non-Repudiation OB 1.2 Lecture 11 Authentication OB 1.2 Lecture 12 Authorization OB 1.2 Lecture 13 Accounting OB 1.2 Lecture 14 Accountability OB 1.2 Lecture 15 Gap analysis OB 1.2 Lecture 16 Zero Trust OB 1.2 Section 3: Security Controls Categories and Types Lecture 17 Control Categories OB 1.1 Lecture 18 Control Types OB 1.1 Lecture 19 Defense in Depth OB 1.1 Section 4: Threats Lecture 20 Threats OB 2.1 Lecture 21 Attributes of Actors OB 2.1 Lecture 22 Threats Motivation OB 2.1 Lecture 23 Nation-state OB 2.1 Lecture 24 Unskilled Attacker OB 2.1 Lecture 25 Hacktivist OB 2.1 Lecture 26 Organized Crime OB 2.1 Lecture 27 Shadow IT OB 2.1 Lecture 28 Threat Vectors and Attack Surfaces OB 2.2 Section 5: Vulnerabilities Lecture 29 Vulnerabilities OB 2.3 Lecture 30 Memory injection and buffer overflows OB 2.3 Lecture 31 Race Conditions OB 2.3 Lecture 32 Malicious Updates OB 2.3 Lecture 33 OS-Based Vulnerabilities OB 2.3 Lecture 34 SQL Injections OB 2.3 Lecture 35 XSS OB 2.3 Lecture 36 Hardware Vulnerabilities OB 2.3 Lecture 37 VM Vulnerabilities OB 2.3 Lecture 38 Cloud-specific Vulnerabilities OB 2.3 Lecture 39 Supply Chain Vulnerabilities OB 2.3 Lecture 40 Cryptographic Vulnerabilities OB 2.3 Lecture 41 Misconfiguration OB 2.3 Lecture 42 Mobile Device Vulnerabilities OB 2.3 Lecture 43 Zero-day Vulnerabilities OB 2.3 Section 6: Signs of Attacks Lecture 44 Malware OB 2.4 Lecture 45 Viruses OB 2.4 Lecture 46 Worms OB 2.4 Lecture 47 Trojans OB 2.4 Lecture 48 Ransomware OB 2.4 Lecture 49 Spyware OB 2.4 Lecture 50 Rootkit OB 2.4 Lecture 51 Logic Bomb OB 2.4 Lecture 52 Keyloggers OB 2.4 Lecture 53 Bloatware OB 2.4 Lecture 54 DDOS OB 2.4 Lecture 55 DNS OB 2.4 Lecture 56 Onpath Attack OB 2.4 Lecture 57 Credential Replay OB 2.4 Lecture 58 Privilege Escalation OB 2.4 Lecture 59 Request Forgery OB 2.4 Lecture 60 Directory Traversal OB 2.4 Lecture 61 Indicators of Malicious Activity OB 2.4 Section 7: Cryptography Lecture 62 Intro to cryptography OB 1.4 Lecture 63 Crypto Terms OB 1.4 Lecture 64 Goals Cryptography OB 1.4 Lecture 65 Algorithm vs Keys OB 1.4 Lecture 66 Ciphers OB 1.4 Lecture 67 Symmetric Encryption OB 1.4 Lecture 68 Symmetric Algorithms OB 1.4 Lecture 69 Asymmetric Encryption OB 1.4 Lecture 70 Asymmetric Algorithms OB 1.4 Lecture 71 Hybrid Cryptography OB 1.4 Lecture 72 Hashing OB 1.4 Lecture 73 Hashing Algorithms OB 1.4 Lecture 74 Digital Signatures OB 1.4 Lecture 75 Intro to PKI OB 1.4 Lecture 76 PKI Purpose OB 1.4 Lecture 77 SSL/TLS Handshake OB 1.4 Lecture 78 PKI Process OB 1.4 Lecture 79 Certificates OB 1.4 Lecture 80 PKI Root of Trust OB 1.4 Lecture 81 PKI Verification and Revocation OB 1.4 Lecture 82 Steganography OB 1.4 Lecture 83 Blockchain OB 1.4 Lecture 84 Salting OB 1.4 Lecture 85 TPM OB 1.4 Lecture 86 Secure Enclave OB 1.4 Lecture 87 Obfuscation OB 1.4 Lecture 88 Tokenization OB 1.4 Lecture 89 Key Escrow OB 1.4 Lecture 90 HSM OB 1.4 Section 8: Social Engineering Lecture 91 Social Engineering OB 2.2 Lecture 92 Phishing OB 2.2 Lecture 93 Vishing OB 2.2 Lecture 94 Smishing OB 2.2 Lecture 95 Spear Phishing OB 2.2 Lecture 96 Misinformation and Disinformation OB 2.2 Lecture 97 Impersonation OB 2.2 Lecture 98 Business Email Compromise OB 2.2 Lecture 99 Pretexting OB 2.2 Lecture 100 Watering Hole OB 2.2 Lecture 101 Brand Impersonation OB 2.2 Lecture 102 Typosquatting OB 2.2 Section 9: Securing IT Assets Lecture 103 Segmentation OB 2.5 Lecture 104 Isolation OB 2.5 Lecture 105 Access Control OB 2.5 Lecture 106 Principles of Least Privilege OB 2.5 Lecture 107 Access Control List OB 2.5 Lecture 108 Filesystem Permissions OB 2.5 Lecture 109 Application Allow List OB 2.5 Lecture 110 Patching OB 2.5 Lecture 111 Configuration Enforcement OB 2.5 Lecture 112 Decommissioning OB 2.5 Lecture 113 Monitoring OB 2.5 Lecture 114 Hardening Techniques OB 2.5 Section 10: Security Principles Lecture 115 Infrastructure Considerations OB 3.2 Lecture 116 Device Placement OB 3.2 Lecture 117 Security Zones OB 3.2 Lecture 118 Attack Surface OB 3.2 Lecture 119 Failure Modes OB 3.2 Lecture 120 Device Attributes OB 3.2 Lecture 121 Network Appliances and Sensors OB 3.2 Lecture 122 Jump Server OB 3.2 Lecture 123 Proxy Servers OB 3.2 Lecture 124 IDS/IPS OB 3.2 Lecture 125 Load Balancer OB 3.2 Lecture 126 802.1x and EAP OB 3.2 Lecture 127 Firewalls OB 3.2 Lecture 128 VPN OB 3.2 Lecture 129 SD-WAN OB 3.2 Lecture 130 Selecting Effective Controls OB 3.2 Section 11: Security Architecture Lecture 131 Cloud OB 3.1 Lecture 132 Infrastructure as Code OB 3.1 Lecture 133 Serverless Architecture OB 3.1 Lecture 134 Microservices OB 3.1 Lecture 135 Air Gapped OB 3.1 Lecture 136 Software-Defined Networking OB 3.1 Lecture 137 On-Premises OB 3.1 Lecture 138 Centralized vs. Decentralized OB 3.1 Lecture 139 Virtualization OB 3.1 Lecture 140 Containerization OB 3.1 Lecture 141 High Availability OB 3.1 Lecture 142 IoT OB 3.1 Lecture 143 ICS OB 3.1 Lecture 144 Security Architecture Considerations OB 3.1 Lecture 145 RTOS and Embedded Systems OB 3.1 Section 12: Data Protection Lecture 146 Regulated Data OB 3.3 Lecture 147 Intellectual Property OB 3.3 Lecture 148 Legal and Financial Data OB 3.3 Lecture 149 Data Classification OB 3.3 Lecture 150 Geolocation and Sovereignty OB 3.3 Lecture 151 Methods to Secure Data OB 3.3 Section 13: Common Security Techniques Lecture 152 Secure Baselines OB 4.1 Lecture 153 Hardening Devices OB 4.1 Lecture 154 Installations of Mobile Devices OB 4.1 Lecture 155 Mobile Solutions and MDM OB 4.1 Lecture 156 Mobile Connection Methods OB 4.1 Lecture 157 Wireless Security OB 4.1 Lecture 158 Application Security Methods OB 4.1 Lecture 159 Security Monitoring OB 4.1 Section 14: Hardware, software and Data Asset Management Lecture 160 Acquisition Procurement OB 4.2 Lecture 161 Assignment and Accounting OB 4.2 Lecture 162 Monitoring and Tracking OB 4.2 Lecture 163 Disposal and Decommission OB 4.2 Section 15: Vulnerability Mana