Autoplay
Autocomplete
Previous Lesson
Complete and Continue
Security+ | CompTIA Security Plus SY0-701 Certification Prep
Introduction to Security+ | CompTIA Security Plus SY0-701 Certification Prep
Introduction to security+ (11:34)
Basic Security Concepts
What is Security? (2:22)
Privacy-Integrity-Availability (3:15)
Encryption and Access Control (2:54)
3 A Rule (Authentication, Authorization and Accounting) (3:52)
Threat (3:45)
What is a Hacker? (6:31)
What is Attack? What are the Stages? (3:19)
Single Point Of Failure (SPOF) (3:12)
Introducing Basic Risk Concepts (3:22)
Quiz
Identity Management
What is Identity Management? (2:14)
KERBEROS & NTLM&LDAP (7:32)
Single Sign-On (SSO) (10:54)
Smart Cards (2:56)
Tokens or Key Fobs (5:20)
Biometric Methods (7:36)
Dual-Factor and Multifactor Authentication (1:38)
PAP / CHAP / MS-CHAP (2:49)
RADIUS (6:26)
Quiz
Users in CompTIA
Managing Accounts - 1 (11:42)
Create a User in comptia (3:03)
Managing Accounts - 2 (9:21)
Passwords (9:18)
Password Policy (9:02)
Quiz
Comparing Access Control Models
Comparing Access Control Models (2:18)
Role-Based Access Control (3:15)
Establishing Access with Group-Based Privileges (4:42)
Rule Based and Discretionary Access Control (5:39)
Mandatory Access Control (2:46)
Establishing Access
Quiz
Virtualization
What is Virtualization? (3:46)
Virtualization Technologies (2:55)
Benefits of Virtualization (4:58)
Security Issues of Virtualization (3:49)
Quiz
Network Technologies
Domain Name Services(DNS) (9:47)
Network Technologies (15:38)
What is the port? How does it work? (5:10)
What is the Network Address (7:05)
Combining the IP Address and the Port (4:37)
Switches (5:03)
Bridge (3:07)
Routers (9:29)
Understanding NAT and PAT (2:37)
Network Separation (3:15)
Proxy Servers (7:11)
Types of Using Network Technologies - 1 (9:12)
Types of Using Network Technologies - 2 (8:26)
Quiz
Wireless Networks
Wireless Cryptographic Protocols (7:38)
Reviewing Basic Wireless Network Information (6:29)
Authentication Protocols for Wireless Networks (6:24)
Network Security Technologies
Firewalls (9:28)
Network Access Control (9:29)
Implementing a Secure Network (5:15)
Intrusion Detection Systems
Detection Methods (11:49)
Understanding IDSs and IPSs (4:43)
Honeypots (4:42)
Quiz
Virtual Private Network (VPN) Technologies
Using VPNs for Remote Access (3:52)
VPN Tunnel Protocols (6:18)
Site-to-Site VPNs (2:36)
Security Threats
Understanding Threat Actors (12:36)
Viruses (2:09)
Logic Bombs (3:18)
Trojans (5:29)
Ransomware (3:24)
Spyware (3:03)
Bots and Botnets (4:17)
Unified Threat Management(UTM) (5:55)
Quiz
Securing Wireless Networks
Enable MAC Filtering (1:53)
Disable SSID Broadcasting or Not (1:27)
Understanding Wireless Attacks
WPS and WPS Attacks (1:52)
Disassociation Attacks (1:58)
Rogue AP (2:14)
Evil Twin (2:08)
Jamming Attacks (3:47)
Bluetooth Attacks (2:52)
RFID Attacks (2:40)
Wireless Replay Attacks (1:49)
Quiz
Network Attacks
Network Attacks (3:39)
SYN Flood Attack (2:55)
MAC Flood Attacks (2:52)
Man-in-the-Middle Attacks (1:34)
ARP Poisoning Attacks (3:52)
DNS Attacks (6:13)
Quiz
Password Attacks
Password Hashes (4:54)
Brute Force Attacks (3:32)
Birthday Attacks (4:46)
Replay Attacks (3:18)
Hijacking and Related Attacks (5:59)
Driver Manipulation (2:07)
Quiz
Zero-Day Attacks
Zero-Day Attacks (4:18)
Code Attacks
Code Quality and Testing (2:49)
Code Reuse and SDKs (4:28)
Development Life-Cycle Models (3:42)
Secure DevOps (3:21)
Version Control and Change Management (2:18)
Provisioning and Deprovisioning (1:50)
Quiz
Web Server Attacks
Web Servers (2:07)
SQL Injection Attacks (4:31)
Protecting Against SQL Injection Attacks (2:39)
DLL Injection (2:25)
Cross-Site Scripting (6:43)
Quiz
Social Engineering Attacks
Social Engineering (4:08)
Shoulder Surfing (1:08)
Tricking Users with Hoaxes (1:19)
Tailgating and Mantraps (1:12)
Dumpster Diving (1:30)
Watering Hole Attacks (1:06)
Spam (2:04)
Phishing (6:25)
Whaling (2:45)
Vishing (2:58)
Quiz
Memory Buffer Vulnerabilities
Pointer Dereference (2:09)
Buffer Overflow Attacks (4:11)
Compiled Versus Runtime Code (1:23)
Proper Input Validation (4:10)
Side Input Validation (3:20)
Avoiding Race Conditions (2:15)
Proper Error Handling (2:13)
Cryptographic Techniques (1:42)
Quiz
Preventing Attacks
Antivirus and Anti-Malware Software (8:19)
Protecting Systems from Malware (2:06)
Advanced Malware Tools (3:33)
Educating Users (1:53)
Server Security
Operating systems (4:09)
Implementing Secure Systems (4:14)
Secure Operating System Configurations (6:24)
Resiliency and Automation Strategies (4:58)
Change Management Policy (7:03)
Secure Staging and Deployment (5:24)
Peripherals (4:08)
EMI and EMP (7:41)
Hardware Security Module (2:27)
Cloud Deployment Models (5:23)
Cloud Services (6:07)
Security Responsibilities with Cloud Models (1:50)
Advanced Cloud Services (4:52)
Quiz
Mobile Devices
Deploying Mobile Devices Securely (2:11)
Deployment Models (8:31)
Mobile Device Management (9:21)
Hardware Control (2:37)
Unauthorized Connections (2:31)
Quiz
Data Security
Protecting Data (11:25)
Data Loss Prevention (5:31)
Database Security
Normalization (5:26)
Database Concepts (2:46)
SQL Queries (1:55)
Database Security (0:59)
Quiz
Risk Management
Understanding Risk Management (2:39)
Risk Management (2:46)
Threats and Threat Assessments (4:22)
Vulnerabilities (2:03)
Risk Assessment (13:06)
Risk Registers (5:51)
Quiz
Cloud Vendors Relationships
Job Notification (3:28)
Finding and Evaluating Cloud Vendors (14:11)
Conducting Evaluations (4:11)
Negotiating Contracts and Billing (9:49)
Professional Services (3:56)
Chargebacks (12:41)
Laws, Regulations And Safety Standards (3:19)
Advising
Key Stakeholders (2:45)
Using Baselines (3:09)
Conducting Feasibility Study (2:19)
Making GAP Analysis (2:50)
Using Reporting (1:30)
Understanding Benchmarks (3:38)
Checking for Vulnerabilities
Password Crackers (1:59)
Checking for Vulnerabilities (1:52)
Network Scanners (5:23)
Wireless Scanners / Cracker (3:18)
Banner Grabbing (0:47)
Vulnerability Scanning (11:23)
Quiz
Penetration Tests
Penetration Tests (2:45)
Passive & Active Reconnaissance (1:59)
Initial Exploitation (3:45)
White, Gray and Black Box Testing (2:55)
Intrusive and Non-Intrusive Testing (1:22)
Passive Versus Active Tools (11:41)
Quiz
Physical Security Precautions
Comparing Physical Security Controls (3:28)
Comparing Door Lock Types (5:31)
Preventing Tailgating with Mantraps (2:00)
Increasing Physical Security with Guards (8:20)
Using Hardware Locks (2:56)
Asset Management (2:33)
Implementing Environmental Controls (14:02)
Quiz
Single Point of Failure
Disk Redundancies (4:25)
Single Point of Failure (1:47)
Server Redundancy and High Availability (9:12)
Backup (15:12)
Business Continuity Plans
Comparing Business Continuity Elements (6:09)
Impact (3:50)
Recovery Time Objective (4:55)
Recovery Sites (5:53)
Disaster Recovery (8:11)
Quiz
Examination of Logs
Monitoring Logs for Event Anomalies (8:43)
OtherLogs-SIEM (7:12)
Continuous Monitoring (6:05)
Controls
Understanding Control Types (7:12)
Control Goals (10:49)
Cryptography and PKI
Introducing Cryptography Concepts (3:05)
Hashing (4:38)
MD5 (0:53)
SHA (2:54)
HMAC (2:45)
Hashing Files (2:56)
Digital Signatures, Certificates and Non-repudiation (2:55)
Providing Confidentiality with Encryption (8:14)
Block Versus Stream Ciphers (4:10)
Symmetric Encryption (1:55)
Symmetric Encryption Methods (6:15)
Asymmetric Encryption (1:57)
Certificates (3:57)
Steganography And Obfuscation (2:41)
Using Cryptographic Protocols (1:47)
Cipher Suites (3:34)
Exploring PKI Components (8:04)
Comparing Certificate Types (4:37)
Quiz
Secure Web Page
HTTPS Transport Encryption (5:14)
Risk Mitigation Methods
Personnel Management Policies (10:41)
Exploring Security Policies (1:13)
Background Check (2:50)
NDA (4:40)
Policy Violations and Adverse Actions (1:37)
Agreement Types (3:00)
PII and PHI (5:13)
Responding to Incidents (2:32)
Providing Training (5:32)
Troubleshooting Personnel Issues (2:26)
Incident Response-Education (6:39)
Quiz
HMAC
Lesson content locked
If you're already enrolled,
you'll need to login
.
Enroll in Course to Unlock