Autoplay
Autocomplete
Previous Lesson
Complete and Continue
CompTIA Security Plus (SY0-601) Course | Comptia Security+
Intro to CompTIA Security Plus (SY0-601) Course | Comptia Security+
1- Introduction to comptia security + (11:34)
2- New LectureFAQ about CompTIA Security Plus (SY0-601) Course | Comptia Security+
Basic Security Concepts
3- What is Security? (2:22)
4- Privacy-Integrity-Availability (3:15)
5- Encryption and Access Control (2:54)
6- 3 A Rule (Authentication, Authorization and Accounting) (3:52)
7- Threat (3:45)
8- What is a Hacker? (6:27)
9- What is Attack? What are the Stages? (3:19)
10- Single Point Of Failure (SPOF) (3:13)
11- Introducing Basic Risk Concepts (3:22)
Quiz in CompTIA Security+(SYo-601)
Quiz
Quiz
Identity Management
12- What is Identity Management? (2:14)
13- KERBEROS & NTLM&LDAP (7:31)
14- Single Sign-On (SSO) (11:02)
15- Smart Cards (2:58)
16- Tokens or Key Fobs (5:20)
17- Biometric Methods (7:36)
18- Dual-Factor and Multifactor Authentication (1:38)
19- PAP / CHAP / MS-CHAP (2:46)
20- RADIUS (6:26)
Quiz
Quiz
Quiz
Summary-1 in CompTIA Security +
21- Summary-1 in comptia security plus (3:26)
Users in CompTIA
22- Create a User in comptia (3:03)
23 - ManageAccounts 1 (11:47)
24 - ManageAccounts 2 (9:22)
25- Passwords (9:18)
26- Password Policy (9:02)
Quiz
Quiz
Quiz
Comparing Access Control Models
27- Comparing Access Control Models (2:19)
28- Role-Based Access Control (3:15)
29- Establishing Access with Group-Based Privileges (4:42)
30- Rule Based and Discretionary Access Control (5:39)
31- Mandatory Access Control (2:46)
32- Establishing Access (6:07)
Quiz
Quiz
Virtualization
33- What is Virtualization? (3:46)
34- Virtualization Technologies (2:55)
35- Benefits of Virtualization (5:00)
36- Security Issues of Virtualization (3:50)
Quiz
Quiz
Quiz
Network Technologies
37- Basic Network Concepts (15:38)
38- Domain Name Services(DNS) (9:47)
39- What is the port? How does it work? (5:10)
40- What is the Network Address (7:05)
41- Combining the IP Address and the Port (4:37)
42- Switches (5:03)
43- Bridge (3:07)
44- Routers (9:29)
45- Understanding NAT and PAT (2:37)
46- Network Separation (3:16)
47- Proxy Servers (7:13)
48- Types of Using Network Technologies - 1 (9:12)
49- Types of Using Network Technologies - 2 (8:26)
Quiz
Quiz
Quiz
Wireless Networks
50- Reviewing Basic Wireless Network Information (6:29)
51- Wireless Cryptographic Protocols (7:38)
52- Authentication Protocols for Wireless Networks (6:24)
Quiz
Quiz
Quiz
Summary-2
53- Summary-2 (3:02)
Network Security Technologies
54- Firewalls (9:28)
55- Network Access Control (9:27)
56- Implementing a Secure Network (5:15)
Quiz
Quiz
Quiz
Intrusion Detection Systems
57- Understanding IDSs and IPSs (4:46)
58- Detection Methods (11:49)
59- Honeypots (4:42)
Quiz
Quiz
Quiz
Virtual Private Network(VPN) Technologies
60- Using VPNs for Remote Access (3:54)
61- VPN Tunnel Protocols (6:18)
62- Site-to-Site VPNs (2:36)
Quiz
Quiz
Quiz
Security Threats
63- Understanding Threat Actors (12:36)
64- Viruses (2:10)
65- Logic Bombs (3:21)
66- Trojans (5:30)
67- Ransomware (3:24)
68- Spyware (3:03)
69- Bots and Botnets (4:17)
70- Unified Threat Management(UTM) (5:55)
Quiz
Quiz
Quiz
Securing Wireless Networks
71- Disable SSID Broadcasting or Not (1:26)
72- Enable MAC Filtering (1:53)
Quiz
Quiz
Quiz
Understanding Wireless Attacks
73- Disassociation Attacks (1:58)
74- WPS and WPS Attacks (1:50)
75- Rogue AP (2:14)
76- Evil Twin (2:08)
77- Jamming Attacks (3:47)
78- Bluetooth Attacks (2:51)
79- RFID Attacks (2:40)
80- Wireless Replay Attacks (1:49)
Quiz
Quiz
Quiz
Summary-3
81- Summary-3 (2:44)
Network Attacks
82- Network Attacks (3:39)
83- SYN Flood Attack (2:55)
84- MAC Flood Attacks (2:53)
85- Man-in-the-Middle Attacks (1:33)
86- ARP Poisoning Attacks (3:49)
87- DNS Attacks (6:17)
Quiz
Quiz
Quiz
Password Attacks
88- Brute Force Attacks (3:32)
89- Password Hashes (4:53)
90- Birthday Attacks (4:50)
91- Replay Attacks (3:25)
92- Hijacking and Related Attacks (5:59)
93- Driver Manipulation (2:07)
Quiz
Quiz
Quiz
Zero-Day Attacks
Quiz
Quiz
Quiz
Code Attacks
95- Code Reuse and SDKs (4:31)
96- Code Quality and Testing (2:51)
97- Development Life-Cycle Models (3:42)
98- Secure DevOps (3:19)
99- Version Control and Change Management (2:17)
100- Provisioning and Deprovisioning (1:48)
Quiz
Quiz
Quiz
Web Server Attacks
101- Web Servers (2:07)
102- SQL Injection Attacks (4:32)
103- Protecting Against SQL Injection Attacks (2:38)
104- DLL Injection (2:24)
105- Cross-Site Scripting (6:40)
Quiz
Quiz
Quiz
Social Engineering Attacks
106- Social Engineering (4:09)
107- Shoulder Surfing (1:06)
108- Tricking Users with Hoaxes (1:18)
109- Tailgating and Mantraps (1:12)
110- Dumpster Diving (1:26)
111- Watering Hole Attacks (1:06)
112- Spam (2:04)
113- Phishing (6:24)
114- Whaling (2:45)
115- Vishing (3:08)
116- Beware of Email from Friends (2:00)
117- Why Social Engineering Works (9:31)
Quiz
Quiz
Quiz
Summary-4
118- Summary-4 (3:32)
Memory Buffer Vulnerabilities
119- Memory Leak (2:41)
120- Buffer Overflow Attacks (4:16)
121- Pointer Dereference (2:07)
122- Compiled Versus Runtime Code (1:20)
123- Proper Input Validation (4:07)
124- Side Input Validation (3:20)
125- Avoiding Race Conditions (2:13)
126- Proper Error Handling (2:14)
127- Cryptographic Techniques (1:43)
Quiz
Quiz
Quiz
Preventing Attacks
128- Protecting Systems from Malware (2:05)
129- Antivirus and Anti-Malware Software (8:22)
130- Advanced Malware Tools (3:31)
131- Educating Users (1:53)
132- Implementing Defense in Depth (3:35)
Quiz
Quiz
Quiz
Server Security
133- Implementing Secure Systems (4:11)
134- Operating systems (4:12)
136- Resiliency and Automation Strategies (4:56)
137- Change Management Policy (7:09)
138- Secure Staging and Deployment (5:26)
139- Peripherals (4:10)
140- EMI and EMP (7:46)
141- Hardware Security Module (2:26)
142- Cloud Deployment Models (5:29)
143- Cloud Services (6:20)
Quiz
Quiz
Quiz
Mobile Devices
145- Deploying Mobile Devices Securely (2:14)
146- Deployment Models (8:35)
148- Unauthorized Software (5:03)
149- Hardware Control (2:42)
150- Unauthorized Connections (2:32)
Quiz
Quiz
New Lecture
Exploring Embedded Systems
151- Exploring Embedded Systems (7:06)
152- Understanding Stuxnet (2:13)
153- Real-Time Operating Systems (3:16)
Summary-5
154- Summary-5 (4:13)
Data Security
155- Protecting Data (11:24)
156- Data Loss Prevention (5:31)
Quiz
Quiz
Database Security
157- Database Concepts (2:47)
160- Database Security (0:57)
Quiz
Quiz
Risk Management
161- Understanding Risk Management (2:39)
162- Risk Management (2:45)
163- Threats and Threat Assessments (4:22)
164- Vulnerabilities (2:03)
165- Risk Assessment (13:06)
166- Risk Registers (5:51)
Quiz
Quiz
Quiz
Checking for Vulnerabilities
167- Checking for Vulnerabilities (1:52)
168- Password Crackers (1:59)
169- Network Scanners (5:23)
170- Wireless Scanners / Cracker (3:17)
171- Banner Grabbing (0:47)
172- Vulnerability Scanning (11:23)
Quiz
Quiz
Penetration Tests
173- Penetration Tests (2:45)
174- Passive & Active Reconnaissance (2:02)
176- White, Gray and Black Box Testing (3:00)
177- Intrusive and Non-Intrusive Testing (1:22)
178- Passive Versus Active Tools (11:41)
Quiz
Quiz
Physical Security Precautions
179- Comparing Physical Security Controls (3:28)
181- Preventing Tailgating with Mantraps (2:00)
182- Increasing Physical Security with Guards (8:20)
183- Using Hardware Locks (2:56)
184- Asset Management (2:33)
185- Implementing Environmental Controls (14:02)
Quiz
Quiz
Summary-6
186- Summary-6 (1:59)
Single Point of Failure
187- Single Point of Failure (1:46)
188- Disk Redundancies (4:24)
190- Backup (15:18)
Quiz
Quiz
Business Continuity Plans
191- Comparing Business Continuity Elements (6:09)
192- Impact (3:54)
193- Recovery Time Objective (4:55)
194- Recovery Sites (5:53)
195- Disaster Recovery (8:11)
Quiz
Quiz
Quiz
Examination of Logs
196- Monitoring Logs for Event Anomalies (8:43)
197- OtherLogs-SIEM (7:12)
198- Continuous Monitoring (6:08)
Quiz
Quiz
Quiz
Controls
200- Control Goals (10:53)
199- Understanding Control Types (7:12)
Quiz
Quiz
Cryptography and PKI
201- Introducing Cryptography Concepts (3:08)
203- MD5 (0:54)
204- SHA (2:55)
205- HMAC (2:49)
206- Hashing Files (2:56)
207- Digital Signatures, Certificates and Non-repudiation (2:52)
208- Hashing Messages (4:35)
209- Providing Confidentiality with Encryption (8:16)
210- Block Versus Stream Ciphers (4:09)
211- Symmetric Encryption (1:55)
214- Certificates (3:58)
216- Using Cryptographic Protocols (1:49)
219- Recovery Agent (1:08)
220- Comparing Certificate Types (4:37)
221- Certificate Formats (3:10)
Quiz
Quiz
Quiz
Protecting Email
222- Protecting Email (1:51)
Quiz
Quiz
Quiz
Secure Web Page
Quiz
Quiz
Risk Mitigation Methods
225- Exploring Security Policies (1:14)
226- Personnel Management Policies (10:41)
228- NDA (4:40)
229- Policy Violations and Adverse Actions (1:37)
Quiz
Summary-7
235- Summary-7 (1:41)
137- Change Management Policy
Lesson content locked
If you're already enrolled,
you'll need to login
.
Enroll in Course to Unlock