Autoplay
Autocomplete
Previous Lesson
Complete and Continue
CompTIA Security+ (SY0-501): Complete Course
Overview of Security
Welcome (4:32)
CompTIA Security+ (Study Notes)
Overview of Security (2:58)
CIA Triad (3:57)
AAA of Security (3:08)
Security Threats (2:59)
Mitigating Threats (2:31)
Hackers (4:56)
Threat Actors (3:15)
Quiz: Overview of Security
Malware
Malware (0:42)
Viruses (6:23)
Worms (2:12)
Trojans (2:51)
Demo: Viruses and Trojans (6:18)
Ransomware (2:33)
Spyware (2:42)
Rootkits (3:32)
Spam (2:59)
Summary of Malware (2:05)
Quiz: Malware
Malware Infections
Malware Infections (4:15)
Common Delivery Methods (4:29)
Demo: Phishing (5:22)
Botnets and Zombies (3:33)
Active Interception and Privilege Escalation (2:31)
Demo: Privilege Escalation (5:44)
Backdoors and Logic Bombs (3:51)
Symptoms of Infection (4:13)
Removing Malware (5:04)
Preventing Malware (5:59)
Quiz: Malware Infection
Security Applications and Devices
Security Applications and Devices (0:35)
Software Firewalls (4:18)
Demo: Software Firewalls (6:47)
IDS (5:05)
Pop-up Blockers (3:12)
Data Loss Prevention (DLP) (3:46)
Securing the BIOS (3:58)
Securing Storage Devices (3:29)
Disk Encryption (4:54)
Quiz: Security Applications and Devices
Mobile Device Security
Mobile Device Security (1:17)
Securing Wireless Devices (1:33)
Mobile Malware (6:21)
SIM Cloning & ID Theft (4:03)
Bluetooth Attacks (2:11)
Mobile Device Theft (3:13)
Security of Apps (5:09)
BYOD (4:59)
Hardening Mobile Devices (3:54)
Quiz: Mobile Device Security
Hardening
Hardening (1:50)
Unnecessary Applications (3:14)
Restricting Applications (2:59)
Demo: Unnecessary Services (5:38)
Trusted Operating System (1:59)
Updates and Patches (3:29)
Patch Management (3:52)
Group Policies (2:36)
Demo: Group Policies (4:09)
File Systems and Hard Drives (3:21)
Quiz: Hardening
Virtualization
Virtualization (2:10)
Hypervisors (2:40)
Demo: How to create a VM (4:41)
Threats to VMs (3:46)
Securing VMs (3:50)
Demo: Securing VMs (4:43)
Quiz: Virtualization
Application Security
Application Security (1:46)
Web Browser Security (6:42)
Web Browser Concerns (3:22)
Demo: Web Browser Configuration (5:22)
Securing Applications (4:52)
Quiz: Application Security
Secure Software Development
Software Development (8:37)
SDLC Principles (6:25)
Testing Methods (7:02)
Software Vulnerabilities and Exploits (3:47)
Buffer Overflows (6:18)
Demo: Buffer Overflow Attack (6:28)
XSS and XSRF (3:10)
SQL Injection (6:28)
Demo: SQL Injection (7:16)
Quiz: Secure Software Development
Network Design
Network Security (0:47)
OSI Model (6:03)
Switches (3:35)
Routers (2:30)
Network Zones (3:29)
Network Access Control (NAC) (2:43)
VLANs (1:32)
Subnetting (1:53)
Network Address Translation (2:29)
Telephony Devices (6:00)
Quiz: Network Design
Perimeter Security
Perimeter Security (0:49)
Firewalls (8:04)
Demo: SOHO Firewall (4:07)
Proxy Servers (4:15)
Honeypots and Honeynets (1:24)
Data Loss Prevention (1:37)
NIDS vs NIPS (4:13)
Unified Threat Management (1:55)
Quiz: Perimeter Security
Cloud Security
Cloud Computing (3:32)
Cloud Types (2:54)
As a Service (7:07)
Cloud Security (2:28)
Defending Servers (4:35)
Quiz: Cloud Security
Network Attacks
Network Attacks (0:40)
Ports and Protocols (4:27)
Memorization of Ports (11:33)
Unnecessary Ports (3:24)
Denial of Service (7:58)
DDoS (1:39)
Stopping a DDoS (2:29)
Spoofing (1:19)
Hijacking (3:47)
Replay Attack (1:29)
Demo: Null Sessions (2:27)
Transitive Attacks (1:27)
DNS Attacks (4:36)
ARP Poisoning (1:33)
Quiz: Network Attacks
Securing Networks
Securing Networks (0:52)
Securing Network Devices (6:45)
Securing Network Media (8:51)
Securing WiFi Devices (4:25)
Wireless Encryption (5:33)
Wireless Access Points (6:14)
Wireless Attacks (4:18)
Demo: Wireless Attack (7:42)
Other Wireless Technologies (6:05)
Quiz: Securing Networks
Physical Security
Physical Security (1:33)
Surveillance (2:54)
Door Locks (3:50)
Demo Lock Picking (1:40)
Biometric Readers (4:18)
Quiz: Physical Security
Facilities Security
Facilities Security (0:39)
Fire Suppression (6:24)
HVAC (2:26)
Shielding (2:37)
Vehicles (2:05)
Quiz: Facilities Security
Authentication
Authentication (5:56)
Authenication Models (5:20)
802.1x (3:47)
LDAP and Kerberos (2:29)
Remote Desktop Services (1:54)
Remote Access Services (2:05)
VPN (3:05)
RADIUS and TACACS+ (2:20)
Authentication Summary (2:06)
Quiz: Authentication
Access Control
Access Control (0:53)
Access Control Models (8:17)
Best Practices (5:46)
Users and Groups (9:15)
Permissions (3:44)
Usernames and Password (2:38)
Demo Policies (4:37)
User Account Control (1:56)
Quiz: Access Control
Risk Assessments
Risk Assessments (8:36)
Qualitative Risk (4:09)
Quantitative Risk (5:30)
Methodologies (2:52)
Security Controls (6:52)
Vulnerability Management (7:53)
Penetration Testing (4:29)
OVAL (1:37)
Vulnerability Assessment (6:55)
Nmap Scanning (8:53)
Demo Vulnerability Scanning (9:36)
Password Analysis (5:57)
Demo Password Cracking (2:38)
Quiz: Risk Assessments
Monitoring and Auditing
Monitoring Types (2:57)
Performance Baselining (4:37)
Protocol Analyzers (3:00)
SNMP (3:43)
Demo Analytical Tools (4:29)
SIEM (2:56)
Auditing (1:57)
Auditing Files (Demo) (3:56)
Logging (3:42)
Log Files (5:17)
Quiz: Monitoring and Auditing
Cryptography
Cryptography (4:58)
Symmetric vs Asymmetric (6:14)
Symmetric Algorithms (4:59)
Public Key Cryptography (3:12)
Asymmetric Algorithms (3:47)
Pretty Good Privacy (1:49)
Key Management (2:14)
One-Time Pad (4:21)
Steganography (Demo) (3:54)
Hashing (8:31)
Demo Hashing (3:07)
Hashing Attacks (3:17)
Increasing Hash Security (1:29)
Quiz: Crytography
Public Key Infrastructure
Public Key Infrastructure (3:56)
Digital Certificates (6:45)
Demo: Certificates (3:33)
Certificate Authorities (4:15)
Web of Trust (2:38)
Quiz: Public Key Infrastructure
Security Protocols
Security Protocols (0:24)
S/MIME (1:32)
SSL and TLS (5:51)
SSH (2:31)
VPN Protocols (6:40)
Demo: Setting Up a VPN (1:37)
Quiz: Security Protocols
Planning for the Worst
Planning for the Worst (2:13)
Redundant Power (3:10)
Backup Power (3:08)
Data Redundancy (4:42)
Demo: RAIDs (3:38)
Network Redundancy (2:07)
Server Redundancy (1:45)
Redundant Sites (2:23)
Data Backup (2:57)
Tape Rotation (3:55)
Disaster Recovery Plan (5:41)
Quiz: Planning for the Worst
Social Engineering
Social Engineering (0:55)
Demo: Pretexting (4:17)
Insider Threat (2:12)
Phishing (1:15)
More Social Engineering (4:03)
User Education (4:40)
Quiz: Social Engineering
Policies and Procedures
Policies and Procedures (5:55)
Data Classifications (6:45)
PII and PHI (6:22)
Security Policies (10:22)
User Education (4:05)
Vendor Relationships (7:55)
Disposal Policies (5:07)
Incident Response Procedures (4:39)
Data Collection Procedures (3:14)
Demo: Disk Imaging (6:59)
IT Security Frameworks (3:20)
Quiz: Policies and Procedures
Conclusion
Conclusion (3:49)
Exam Tricks (4:12)
Security+ Practice Exam
Digital Certificates
Lesson content locked
If you're already enrolled,
you'll need to login
.
Enroll in Course to Unlock