Autoplay
Autocomplete
Previous Lesson
Complete and Continue
CompTIA Security+ (SY0-601) Complete Course & Comptia Lab
CompTIA Security+ (SY0-601) Complete Course & Exam Lab Introduction
1- CompTIA Security+ (SY0-601) Complete Course & Exam Lab Introduction (11:34)
2- FAQ CompTIA Security Plus (SY0-601) Course | Comptia Security+
Basic Security Concepts
3- What is Security? (2:22)
4- Privacy-Integrity-Availability (3:15)
5- Encryption and Access Control (2:54)
6- 3 A Rule (Authentication, Authorization and Accounting) (3:52)
7- Threat (3:45)
8- What is a Hacker? (6:27)
9- What is Attack? What are the Stages? (3:19)
10- Single Point Of Failure (SPOF) (3:13)
11- Introducing Basic Risk Concepts (3:22)
Quiz
Quiz
Quiz
Identity Management
12- What is Identity Management? (2:14)
13- KERBEROS & NTLM&LDAP (7:31)
14- Single Sign-On (11:02)
15- Smart Cards (2:58)
16- Tokens or Key Fobs (5:20)
17- Biometric Methods (7:36)
18- Dual-Factor and Multifactor Authentication (1:38)
19- PAP / CHAP / MS-CHAP (2:46)
20- RADIUS (6:26)
Quiz
Quiz
Quiz
Summary-1
21- Summary-1 (3:26)
Users
22- Create a User In Comptia (3:03)
23- Managing Accounts-1 (11:44)
24- Managing Accounts-2 (9:20)
25- Passwords (9:18)
26- Password Policy (9:02)
Quiz
Quiz
Quiz
Comparing Access Control Models
27- Comparing Access Control Models (2:19)
28- Role-Based Access Control (3:15)
29- Establishing Access with Group-Based Privileges (4:42)
30- Rule Based and Discretionary Access Control (5:39)
31- Mandatory Access Control (2:46)
32- Establishing Access Attribute-Based Access Control (6:07)
Quiz
Quiz
Quiz
Virtualization
33- What is Virtualization? (3:46)
34- Virtualization Technologies (2:55)
35- Benefits of Virtualization (5:00)
36- Security Issues of Virtualization (3:50)
37- Create Lab Download and Install VirtualBox (5:02)
38- Install Virtual Kali Linux-1 (1:43)
39- Install Virtual Kali Linux-2 (6:46)
40- Install Virtual Kali Linux-3 (5:24)
41- OWASP Broken Web Applications (4:30)
42- Configuring NAT Network in Oracle VM VirtualBox (1:07)
Quiz
Quiz
Quiz
Network Technologies
43- Basic Network Concepts (15:38)
44- Domain Name Services(DNS) (9:47)
45- What is the port? How does it work? (5:10)
46- What is the Network Address (7:05)
47- Combining the IP Address and the Port (4:37)
48- Switches (5:03)
49- Bridge (3:07)
50- Routers (9:29)
51- Understanding NAT and PAT (2:37)
52- Network Separation (3:16)
53- Proxy Servers (7:13)
54- Types of Using Network Technologies-1 (9:14)
55- Types of Using Network Technologies-2 (8:26)
Quiz
Quiz
Quiz
Wireless Networks
56- Reviewing Basic Wireless Network Information (6:29)
57- Wireless Cryptographic Protocols (7:38)
58- Authentication Protocols for Wireless Networks (6:24)
Quiz
Quiz
Quiz
Summary-2
59- Summary-2 (3:02)
Network Security Technologies
60- Firewalls (9:28)
61- Network Access Control (9:27)
62- Implementing a Secure Network (5:15)
Quiz
Quiz
Quiz
Intrusion Detection Systems
63- Understanding IDSs and IPSs (4:46)
64- Detection Methods (11:49)
65- Honeypots (4:42)
Quiz
Quiz
Quiz
Virtual Private Network(VPN) Technologies
66- Using VPNs for Remote Access (3:54)
67- VPN Tunnel Protocols (6:18)
68- Site-to-Site VPNs (2:36)
Quiz
Quiz
Quiz
Security Threats
69- Understanding Threat Actors (12:36)
70- Viruses (2:10)
71- Logic Bombs (3:21)
72- Trojans
73- Ransomware (3:24)
74- Spyware (3:03)
75- Bots and Botnets (4:17)
76- Unified Threat Management(UTM) (5:55)
Quiz
Quiz
Quiz
Securing Wireless Networks
77- Disable SSID Broadcasting or Not (1:26)
78- Enable MAC Filtering (1:53)
Quiz
Quiz
Quiz
Understanding Wireless Attacks
79- Disassociation Attacks (1:58)
80- WPS and WPS Attacks (1:50)
81- Rogue AP (2:14)
82- Evil Twin (2:08)
83- Jamming Attacks (3:47)
84- Bluetooth Attacks (2:51)
85- RFID Attacks (2:40)
86- Wireless Replay Attacks (1:49)
87- Rogue Access Points-Airbase-ng (5:46)
88- Rogue Access Points-Evil-Twin-Attack (6:42)
89- Cracking-WEP-Preparing-Attacks (2:49)
90- Cracking-WEP-Fake-Authentication-Attack (3:50)
91- Cracking-WEP-ChopChop-Attack (3:47)
92- Cracking-WPA-Aircrack-ng (3:56)
93- Cracking-WPA-John-the-Ripper (4:09)
Quiz
Quiz
Quiz
Summary-3
94- Summary-3 (2:44)
Network Attacks
95- Network Attacks (3:39)
96- SYN Flood Attack (2:55)
97- MAC Flood Attacks (2:53)
98- MAC Flood Using Macof (7:09)
99- Man-in-the-Middle Attacks (1:33)
100- ARP Poisoning Attacks (3:49)
101- DNS Attacks (6:17)
Quiz
Quiz
Password Attacks
102- Brute Force&Dictionary Attacks (3:32)
104- Cain & Abel_ A Dictionary Attack (3:36)
105- Password Hashes (4:53)
106- Cain and Abel_ Gathering Hashes (4:43)
107- Birthday Attacks (4:50)
108- Replay Attacks (3:25)
109- Hijacking and Related Attacks (5:59)
110- Driver Manipulation (2:07)
Quiz
Quiz
Quiz
Zero-Day Attacks
111- Zero-Day Attacks (4:19)
Quiz
Quiz
Quiz
Code Attacks
112- Code Reuse and SDKs (4:31)
113- Code Quality and Testing (2:51)
114- Development Life-Cycle Models (3:42)
115- Secure DevOps (3:19)
116- Version Control and Change Management (2:17)
117- Provisioning and Deprovisioning (1:48)
Quiz
Quiz
Quiz
Web Server Attacks
118- Web Servers (2:07)
119- SQL Injection Attacks (4:32)
120- Protecting Against SQL Injection Attacks (2:38)
121- SQL Injection - Part I (4:20)
122- SQL Injection - Part II (4:41)
123- SQL Injection - Part III (5:20)
124- DLL Injection (2:24)
125- Cross-Site Scripting (6:40)
126- Classification of Web Attacks (1:36)
127- Zed Attack Proxy (ZAP)_ A Web App Vulnerability Scanner (3:06)
128- XSS (Cross Site Scripting) - Stored and DOM Based XSS (7:01)
129- Cross Site Request Forgery (CSRF) (5:12)
130- Path Traversal_ File (5:41)
Quiz
Quiz
Quiz
Social Engineering Attacks
131- Social Engineering (4:09)
132- Shoulder Surfing (1:06)
133- Tricking Users with Hoaxes (1:18)
134- Tailgating and Mantraps (1:12)
135- Dumpster Diving (1:26)
136- Watering Hole Attacks (1:06)
137- Spam (2:04)
138- Phishing (6:24)
139- Whaling (2:45)
140- Vishing (3:08)
143- Social Engineering Toolkit (SET) for Phishing (6:33)
Quiz
Quiz
Quiz
Summary-4
144- Summary-4 (3:32)
Memory Buffer Vulnerabilities
145- Memory Leak (2:41)
146- Buffer Overflow Attacks (4:16)
147- Pointer Dereference (2:07)
148- Compiled Versus Runtime Code (1:20)
149- Proper Input Validation (4:07)
150- Side Input Validation (3:20)
151- Avoiding Race Conditions (2:13)
152- Proper Error Handling (2:14)
153- Cryptographic Techniques (1:43)
Quiz
Quiz
Quiz
Preventing Attacks
154- Protecting Systems from Malware (2:05)
155- Antivirus and Anti-Malware Software (8:22)
156- Advanced Malware Tools (3:31)
157- Educating Users (1:53)
158- Implementing Defense in Depth (3:35)
Quiz
Quiz
Quiz
Server Security
159- Implementing Secure Systems (4:11)
160- Operating systems (4:12)
161- Secure Operating System Configurations (6:33)
162- Resiliency and Automation Strategies (4:56)
163- Change Management Policy (7:09)
164- Secure Staging and Deployment (5:26)
165- Peripherals (4:10)
166- EMI and EMP (7:46)
167- Hardware Security Module (2:26)
168- Cloud Deployment Models (5:29)
169- Cloud Services (6:20)
170- Security Responsibilities with Cloud Models (1:52)
Quiz
Quiz
Quiz
Mobile Devices
171- Deploying Mobile Devices Securely (2:14)
172- Deployment Models (8:35)
173- Mobile Device Management (9:26)
174- Unauthorized Software (5:03)
175- Hardware Control (2:42)
176- Unauthorized Connections (2:32)
Quiz
Quiz
Quiz
Exploring Embedded Systems
177- Exploring Embedded Systems (7:06)
178- Understanding Stuxnet (2:13)
179- Real-Time Operating Systems (3:16)
Quiz
Summary-5
180- Summary-5 (4:13)
Data Security
181- Protecting Data (11:24)
182- Data Loss Prevention (5:31)
Quiz
Quiz
Quiz
Database Security
184- Normalization (5:26)
186- Database Security (0:57)
Quiz
Quiz
Quiz
Risk Management
187- Understanding Risk Management (2:39)
188- Risk Management (2:45)
189- Threats and Threat Assessments (4:22)
190- Vulnerabilities (2:03)
191- Risk Assessment (13:06)
192- Risk Registers (5:51)
Quiz
Quiz
Checking for Vulnerabilities
194- Password Crackers (1:59)
196- Hydra_ Cracking the Password of a Web App (10:01)
197- Password Cracking with Cain & Aibel (1:01)
198- Network Scan Types (2:50)
204- Nmap with Version Detection (5:58)
205- Nmap with Operating System Detection (7:10)
206- Active Scan with Hping (8:30)
210- Introduction to Vulnerability Scan (9:19)
211- Introduction to Nessus (1:57)
212- Nessus_ First Scan (7:07)
Quiz
Quiz
Quiz
Penetration Tests
213- Penetration Tests (2:45)
214- Passive & Active Reconnaissance (2:02)
215- Initial Exploitation (3:45)
Quiz
Physical Security Precautions
219- Comparing Physical Security Controls (3:28)
223- Using Hardware Locks (2:56)
224- Asset Management (2:33)
Quiz
Summary-6
226- Summary-6 (1:59)
Single Point of Failure
227- Single Point of Failure (1:46)
Business Continuity Plans
231- Comparing Business Continuity Elements (6:09)
235- Disaster Recovery (8:11)
Examination of Logs
237- Other Logs-SIEM (7:12)
Cryptography and PKI
245- HMAC (2:49)
249- Providing Confidentiality with Encryption (8:16)
99- Man-in-the-Middle Attacks
Lesson content locked
If you're already enrolled,
you'll need to login
.
Enroll in Course to Unlock