Autoplay
Autocomplete
Previous Lesson
Complete and Continue
CompTIA Security Plus (SY0-701) Course | Comptia Security+
Intro to CompTIA Security Plus (SY0-701) Course | Comptia Security+
Introduction to comptia security + (11:34)
FAQ about CompTIA Security Plus (SY0-701) Course | Comptia Security+
Basic Security Concepts
What is Security? (2:22)
Privacy-Integrity-Availability (3:15)
Encryption and Access Control (2:54)
3 A Rule (Authentication, Authorization and Accounting) (3:52)
Threat (3:45)
What is a Hacker? (6:27)
What is Attack? What are the Stages? (3:19)
Single Point Of Failure (SPOF) (3:13)
Introducing Basic Risk Concepts (3:22)
Quiz in CompTIA Security+(SYo-601)
Quiz
Quiz
Identity Management
What is Identity Management? (2:14)
KERBEROS & NTLM&LDAP (7:31)
Single Sign-On (SSO) (11:02)
Smart Cards (2:58)
Tokens or Key Fobs (5:20)
Biometric Methods (7:36)
Dual-Factor and Multifactor Authentication (1:38)
PAP / CHAP / MS-CHAP (2:46)
RADIUS (6:26)
Quiz
Quiz
Quiz
Users in CompTIA
Create a User in comptia (3:03)
ManageAccounts 1 (11:47)
ManageAccounts 2 (9:22)
Passwords (9:18)
Password Policy (9:02)
Quiz
Quiz
Quiz
Comparing Access Control Models
Comparing Access Control Models (2:19)
Role-Based Access Control (3:15)
Establishing Access with Group-Based Privileges (4:42)
Rule Based and Discretionary Access Control (5:39)
Mandatory Access Control (2:46)
Establishing Access (6:07)
Quiz
Quiz
Virtualization
What is Virtualization? (3:46)
Virtualization Technologies (2:55)
Benefits of Virtualization (5:00)
Security Issues of Virtualization (3:50)
Quiz
Quiz
Quiz
Network Technologies
Basic Network Concepts (15:38)
Domain Name Services(DNS) (9:47)
What is the port? How does it work? (5:10)
What is the Network Address (7:05)
Combining the IP Address and the Port (4:37)
Switches (5:03)
Bridge (3:07)
Routers (9:29)
Understanding NAT and PAT (2:37)
Network Separation (3:16)
Proxy Servers (7:13)
Types of Using Network Technologies - 1 (9:12)
Types of Using Network Technologies - 2 (8:26)
Quiz
Quiz
Quiz
Wireless Networks
Reviewing Basic Wireless Network Information (6:29)
Wireless Cryptographic Protocols (7:38)
Authentication Protocols for Wireless Networks (6:24)
Quiz
Quiz
Quiz
Network Security Technologies
Firewalls (9:28)
Network Access Control (9:27)
Implementing a Secure Network (5:15)
Quiz
Quiz
Quiz
Intrusion Detection Systems
Understanding IDSs and IPSs (4:46)
Detection Methods (11:49)
Honeypots (4:42)
Quiz
Quiz
Quiz
Virtual Private Network(VPN) Technologies
Using VPNs for Remote Access (3:54)
VPN Tunnel Protocols (6:18)
Site-to-Site VPNs (2:36)
Quiz
Quiz
Quiz
Security Threats
Understanding Threat Actors (12:36)
Viruses (2:10)
Logic Bombs (3:21)
Trojans (5:30)
Ransomware (3:24)
Spyware (3:03)
Bots and Botnets (4:17)
Unified Threat Management(UTM) (5:55)
Quiz
Quiz
Quiz
Securing Wireless Networks
Disable SSID Broadcasting or Not (1:26)
Enable MAC Filtering (1:53)
Quiz
Quiz
Quiz
Understanding Wireless Attacks
Disassociation Attacks (1:58)
WPS and WPS Attacks (1:50)
Rogue AP (2:14)
Evil Twin (2:08)
Jamming Attacks (3:47)
Bluetooth Attacks (2:51)
RFID Attacks (2:40)
Wireless Replay Attacks (1:49)
Quiz
Quiz
Quiz
Network Attacks
Network Attacks (3:39)
SYN Flood Attack (2:55)
MAC Flood Attacks (2:53)
Man-in-the-Middle Attacks (1:33)
ARP Poisoning Attacks (3:49)
DNS Attacks (6:17)
Quiz
Quiz
Quiz
Password Attacks
Brute Force Attacks (3:32)
Password Hashes (4:53)
Birthday Attacks (4:50)
Replay Attacks (3:25)
Hijacking and Related Attacks (5:59)
Driver Manipulation (2:07)
Quiz
Quiz
Quiz
Zero-Day Attacks
Quiz
Quiz
Quiz
Code Attacks
Code Reuse and SDKs (4:31)
Code Quality and Testing (2:51)
Development Life-Cycle Models (3:42)
Secure DevOps (3:19)
Version Control and Change Management (2:17)
Provisioning and Deprovisioning (1:48)
Quiz
Quiz
Quiz
Web Server Attacks
Web Servers (2:07)
SQL Injection Attacks (4:32)
Protecting Against SQL Injection Attacks (2:38)
DLL Injection (2:24)
Cross-Site Scripting (6:40)
Quiz
Quiz
Quiz
Social Engineering Attacks
Social Engineering (4:09)
Shoulder Surfing (1:06)
Tricking Users with Hoaxes (1:18)
Tailgating and Mantraps (1:12)
Dumpster Diving (1:26)
Watering Hole Attacks (1:06)
Spam (2:04)
Phishing (6:24)
Whaling (2:45)
Vishing (3:08)
Beware of Email from Friends (2:00)
Why Social Engineering Works (9:31)
Quiz
Quiz
Quiz
Memory Buffer Vulnerabilities
Memory Leak (2:41)
Buffer Overflow Attacks (4:16)
Pointer Dereference (2:07)
Compiled Versus Runtime Code (1:20)
Proper Input Validation (4:07)
Side Input Validation (3:20)
Avoiding Race Conditions (2:13)
Proper Error Handling (2:14)
Cryptographic Techniques (1:43)
Quiz
Quiz
Quiz
Preventing Attacks
Protecting Systems from Malware (2:05)
Antivirus and Anti-Malware Software (8:22)
Advanced Malware Tools (3:31)
Educating Users (1:53)
Implementing Defense in Depth (3:35)
Quiz
Quiz
Quiz
Server Security
Implementing Secure Systems (4:11)
Operating systems (4:12)
Secure Operating System Configurations (6:33)
Resiliency and Automation Strategies (4:56)
Change Management Policy (7:09)
Secure Staging and Deployment (5:26)
Peripherals (4:10)
EMI and EMP (7:46)
Hardware Security Module (2:26)
Cloud Deployment Models (5:29)
Cloud Services (6:20)
Security Responsibilities with Cloud Models (1:52)
Advanced Cloud Services (4:52)
Quiz
Quiz
Quiz
Mobile Devices
Deploying Mobile Devices Securely (2:14)
Deployment Models (8:35)
Mobile Device Management (9:26)
Unauthorized Software (5:03)
Hardware Control (2:42)
Unauthorized Connections (2:32)
Quiz
Quiz
Quiz
New Lecture
Exploring Embedded Systems
Exploring Embedded Systems (7:06)
Understanding Stuxnet (2:13)
Real-Time Operating Systems (3:16)
Data Security
Protecting Data (11:24)
Data Loss Prevention (5:31)
Quiz
Quiz
Quiz
Database Security
Database Concepts (2:47)
Normalization (5:26)
SQL Queries (1:56)
Database Security (0:57)
Quiz
Quiz
Quiz
Risk Management
Understanding Risk Management (2:39)
Risk Management (2:45)
Threats and Threat Assessments (4:22)
Vulnerabilities (2:03)
Risk Assessment (13:06)
Risk Registers (5:51)
Quiz
Quiz
Quiz
Cloud Vendors Relationships
Finding and Evaluating Cloud Vendors (14:11)
Job Notification (3:28)
Conducting Evaluations (4:11)
Negotiating Contracts and Billing (9:49)
Professional Services (3:56)
Chargebacks (12:41)
Laws, Regulations And Safety Standards (3:19)
Advising
Using Baselines (3:09)
Key Stakeholders (2:45)
Conducting Feasibility Study (2:19)
Making GAP Analysis (2:50)
Using Reporting (1:30)
Understanding Benchmarks (3:38)
Checking for Vulnerabilities
Checking for Vulnerabilities (1:52)
Password Crackers (1:59)
Network Scanners (5:23)
Wireless Scanners / Cracker (3:17)
Banner Grabbing (0:47)
Vulnerability Scanning (11:23)
Quiz
Quiz
Quiz
Penetration Tests
Penetration Tests (2:45)
Passive & Active Reconnaissance (2:02)
Initial Exploitation (3:45)
White, Gray and Black Box Testing (3:00)
Intrusive and Non-Intrusive Testing (1:22)
Passive Versus Active Tools (11:41)
Quiz
Quiz
Quiz
Physical Security Precautions
Comparing Physical Security Controls (3:28)
Comparing Door Lock Types (5:33)
Preventing Tailgating with Mantraps (2:00)
Increasing Physical Security with Guards (8:20)
Using Hardware Locks (2:56)
Asset Management (2:33)
Implementing Environmental Controls (14:02)
Quiz
Quiz
Quiz
Single Point of Failure
Single Point of Failure (1:46)
Disk Redundancies (4:24)
Server Redundancy and High Availability (9:11)
Backup (15:18)
Quiz
Quiz
Quiz
Business Continuity Plans
Comparing Business Continuity Elements (6:09)
Impact (3:54)
Recovery Time Objective (4:55)
Recovery Sites (5:53)
Disaster Recovery (8:11)
Quiz
Quiz
Quiz
Examination of Logs
Monitoring Logs for Event Anomalies (8:43)
OtherLogs-SIEM (7:12)
Continuous Monitoring (6:08)
Quiz
Quiz
Quiz
Controls
Understanding Control Types (7:12)
Control Goals (10:53)
Quiz
Quiz
Quiz
Cryptography and PKI
Introducing Cryptography Concepts (3:08)
Hashing (4:43)
MD5 (0:54)
SHA (2:55)
HMAC (2:49)
Hashing Files (2:56)
Digital Signatures, Certificates and Non-repudiation (2:52)
Hashing Messages (4:35)
Providing Confidentiality with Encryption (8:16)
Block Versus Stream Ciphers (4:09)
Symmetric Encryption (1:55)
Symmetric Encryption Methods (6:19)
Asymmetric Encryption (1:56)
Certificates (3:58)
Steganography And Obfuscation (2:40)
Using Cryptographic Protocols (1:49)
Cipher Suites (3:38)
Exploring PKI Components (8:04)
Recovery Agent (1:08)
Comparing Certificate Types (4:37)
Certificate Formats (3:10)
Quiz
Quiz
Quiz
Protecting Email
Protecting Email (1:51)
Encrypting Email (3:39)
Quiz
Quiz
Quiz
Secure Web Page
HTTPS Transport Encryption (5:08)
Quiz
Quiz
Quiz
Risk Mitigation Methods
Exploring Security Policies (1:14)
Personnel Management Policies (10:41)
Background Check (2:50)
NDA (4:40)
Policy Violations and Adverse Actions (1:37)
Agreement Types (3:02)
PII and PHI (5:13)
Responding to Incidents (2:33)
Providing Training (5:32)
Troubleshooting Personnel Issues (2:28)
Quiz
Quiz
Quiz
Conclusion
Conclusion (11:23)
Comptia Security + SYO701 Extra Resources
238- Comptia Practice Test PDF File - Exam - Questions
239- Comptia Practice Test PDF File - Exam 1 - Answers
ManageAccounts 2
Lesson content locked
If you're already enrolled,
you'll need to login
.
Enroll in Course to Unlock