Autoplay
Autocomplete
HTML5
Flash
Player
Speed
Previous Lecture
Complete and continue
CompTIA Security+ SY0-501
Introduction
CompTIA Security+ SY0-501: Introduction (5:43)
Module 1: Threats, Attacks and Vulnerabilities
Module Introduction (0:57)
Lesson 1: Analyze Indicators of Compromise and Determine Malware
Learning objectives (0:28)
1.1 Types of Malware (17:31)
1.2 Indicators of Compromise (15:39)
1.3 Security in Action: Malware IOC (4:54)
Lesson 2: Compare and Contrast Cyber Attacks
Learning objectives (0:29)
2.1 Anticipating Cyber Attacks (11:02)
2.2 Social Engineering (14:07)
2.3 Application and Service Attacks (22:05)
2.4 Wireless Attacks (11:21)
2.5 Security in Action: Typo Squatting (3:07)
Lesson 3: Explain Threat Actors and Attributes
Learning objectives (0:30)
3.1 Actor Types and Attributes (9:27)
3.2 Open Source Threat Intelligence (OSINT) (13:25)
3.3 Security in Action: Open Source Intelligence (2:56)
Lesson 4: Explain Penetration Testing
Learning objectives (0:26)
4.1 Pen Testing Concepts (8:21)
4.2 Pen Testing Techniques (15:27)
4.3 Security in Action: Passive Recon (4:18)
Lesson 5: Explain Vulnerability Scanning
Learning objectives (0:26)
5.1 Scanning Techniques (12:06)
5.2 Common Findings (9:04)
5.3 Security in Action: Port Scanning (5:28)
Lesson 6: Explain the Impact of Vulnerabilities
Learning objectives (0:27)
6.1 Business Process Vulnerabilities (11:28)
6.2 Source Code Vulnerabilities (16:00)
6.3 Security in Action: Impact of End of Life Systems (3:29)
Module 1 Review (13:15)
Module 2: Tools and Technologies
Module Introduction (1:08)
Lesson 7: Install and Configure Network Components
Learning objectives (0:41)
7.1 Firewalls (20:05)
7.2 Filters and Proxies (9:21)
7.3 IDS and IPS (12:13)
7.4 Virtual Private Networks (11:49)
7.5 Layer 1 and 2 Devices (8:55)
7.6 Routers and Load Balancers (9:56)
7.7 Access Points (8:05)
7.8 NACs, DLPs, and Mail Gateways (11:56)
7.9 SIEM (6:30)
7.10 Security in Action: Firewall Rule (7:00)
Lesson 8: Assessing Security Posture
Learning objectives (0:26)
8.1 Security Scanners and Analyzers (13:26)
8.2 Command Line Tools (6:24)
8.3 Security in Action: Demonstrate Nmap (4:59)
Lesson 9: Troubleshoot Common Security Issues
Learning objectives (0:27)
9.1 Configuration and Operational Issues (15:30)
9.2 Personnel Issues (6:54)
9.3 Security in Action: Root Cause Analysis (5 Whys) (2:52)
Lesson 10: Interpreting Output
Learning objectives (0:34)
10.1 Activity and Error Reporting (8:34)
10.2 Security in Action: Local Host Reporting (2:03)
Lesson 11: Deploy Mobile Devices Securely
Learning objectives (0:32)
11.1 Mobile Connection Methods (8:49)
11.2 Mobile Device Management (9:22)
11.3 Mobile Device Concerns (7:06)
11.4 Security in Action: Mobile Device Ownership (2:15)
Lesson 12: Implement Secure Protocols
Learning objectives (0:35)
12.1 Secure Communication Protocols (12:04)
12.2 Secure Network and Administration Protocols (12:07)
12.3 Security in Action: Packet Capture and Protocol Analyzer (3:23)
Module 2 Review (12:04)
Module 3: Architecture and Design
Module Introduction (1:17)
Lesson 13: Explain Use Cases and Purpose of Frameworks, Configuration Guides, and Best Practices
Learning objectives (0:31)
13.1 Frameworks, Benchmarks, and Guides (9:35)
13.2 Security in Action: Configuration Guidance (2:40)
Lesson 14: Implement Secure Network Architecture
Learning objectives (0:35)
14.1 Zones (12:34)
14.2 Isolation (6:46)
14.3 Device Placement (9:29)
14.4 Security in Action: Secure Enclave & Air Gapping (5:00)
Lesson 15: Implement Secure System Design
Learning objectives (0:27)
15.1 Hardware / Firmware Security (7:19)
15.2 Operating System Security (10:57)
15.3 Security in Action: Hardening an Operating System (3:33)
Lesson 16: Explain the Importance of Secure Staging and Deployment
Learning objectives (0:28)
16.1 Staging and Deployment Strategies (7:05)
16.2 Security in Action: Staging Process (2:54)
Lesson 17: Explain the Security Implications of Embedded Systems
Learning objectives (0:31)
17.1 Embedded System Security (10:57)
17.2 Security in Action: Available Resources (4:52)
Lesson 18: Summarize Secure Application Development and Deployment Concepts
Learning objectives (0:35)
18.1 Development Lifecycle (12:17)
18.2 Secure Coding Techniques (9:52)
18.3 Code Quality and Testing (7:03)
18.4 Security in Action: Code Attacks (5:43)
Lesson 19: Summarize Cloud and Virtualization Concepts
Learning objectives (0:33)
19.1 Virtualization (12:32)
19.2 Cloud Service and Deployment Models (14:33)
19.3 Security in Action: Workstation Virtualization (3:02)
Lesson 20: Explain Risk Reducing Resiliency and Automation Strategies
Learning objectives (0:32)
20.1 Automation and Persistence Techniques (8:07)
20.2 Redundancy and Fault Tolerance (8:30)
20.3 Security in Action: RAID (4:17)
Lesson 21: Explain the Importance of Physical Security Controls
Learning objectives (0:36)
21.1 Building and Facility Security (13:14)
21.2 Environment Controls (11:43)
21.3 Security in Action: CPTED (2:31)
Module 3 Review (13:24)
Module 4: Identity and Access Management
Module Introduction (0:58)
Lesson 22: Compare and Contrast Identity and Access Management Concepts
Learning objectives (0:36)
22.1 Identification and Authentication (10:44)
22.2 Identity Management (6:21)
22.3 Security in Action: Transitive Trust (2:34)
Lesson 23: Install and Configure Identity and Access Services
Learning objectives (0:39)
23.1 Network Identity and Access Services (16:44)
23.2 Web Identity and Access Services (9:28)
23.3 Security in Action: OAuth 2.0 00:03:28 (3:28)
Lesson 24: Implement Identity and Access Management Controls
Learning objectives (0:30)
24.2 Access Control Models (16:11)
24.3 Security in Action: DAC Permissions (6:02)
24.1 Authentication Controls (9:17)
Lesson 25: Differentiate Common Account Management Practices
Learning objectives (0:30)
25.1 Account Types (9:31)
25.2 General Concepts (10:01)
25.3 Account Auditing (9:42)
25.4 Security in Action: Account Policy Enforcement (4:32)
Module 4 Review (9:15)
Module 5: Risk Management
Module Introduction (1:13)
Lesson 26: Explain the Importance of Policies, Plans and Procedures
Learning objectives (0:38)
26.1 Security Policies and Agreements (10:17)
26.2 Personnel Management (7:23)
26.3 Security Awareness Training (7:42)
26.4 Security in Action: Policies, Standards and Procedures (3:17)
Lesson 27: Summarize Business Impact Analysis Concepts
Learning objectives (0:29)
27.1 Business Impact Analysis (10:03)
27.2 Privacy Impact and Threshold Assessments (13:12)
27.3 Security in Action: BIA Metrics (3:58)
Lesson 28: Explain Risk Management Concepts
Learning objectives (0:31)
28.1 Risk Management (10:31)
28.2 Risk Assessments (12:00)
28.3 Testing and Change Management (5:07)
28.4 Security in Action: Quantitative Risk Assessment (3:37)
Lesson 29: Follow Incident Response Procedures
Learning objectives (0:31)
29.1 Incident Response Plans (10:44)
29.2 Incident Response Process (9:08)
29.3 Security in Action: IR Response Creating a Playbook (3:24)
Lesson 30: Summarize the Basic Concepts of Forensics
Learning objectives (0:32)
30.1 Forensic Fundamentals (9:58)
30.2 Data Acquisition (9:48)
30.3 Security in Action: Forensic Techniques (2:33)
Lesson 31: Explain Disaster Recovery and Continuity of Operations Concepts
Learning objectives (0:37)
31.1 Recovery and Restoration (14:07)
31.2 Continuity of Operations Planning (10:09)
31.3 Security in Action: Site Selection Decision Tree (2:56)
Lesson 32: Compare and Contrast Controls
Learning objectives (0:28)
32.1 Comparing and Contrasting Controls (9:37)
32.2 Security in Action: Technical Control Crossover (4:28)
Lesson 33: Carry Out Data Security and Privacy Practices
Learning objectives (0:30)
33.1 Data Protection and Classification (9:57)
33.2 Data Retention and Destruction (7:16)
33.3 Security in Action: Disk Wiping (2:53)
Module 5 Review (11:57)
Module 6: Cryptography and PKI
Module Introduction (0:55)
Lesson 34: Compare and Contrast Basic Concepts of Cryptography
Learning objectives (0:31)
34.1 Cryptography Basics (11:26)
34.2 Steganography (3:55)
34.3 Security in Action: Basic Steganography (2:29)
Lesson 35: Explain Cryptographic Algorithms and Their Basic Characteristics
Learning objectives (0:29)
35.1 Symmetric Encryption (14:07)
35.2 Asymmetric Encryption (14:12)
35.3 Hashing (11:46)
35.4 Digital Signatures (7:01)
35.5 Security in Action: Hashing (2:54)
Lesson 36: Install and Configure Wireless Security Standards
Learning objectives (0:30)
36.1 Wireless Cryptographic Protocols (10:32)
36.2 Security in Action: WPS Issues (0:55)
Lesson 37: Implement PKI
Learning objectives (0:31)
37.1 Digital Certificates (18:30)
37.2 Key Lifecycle Management (6:51)
37.3 Cryptographic Attacks (8:29)
37.4 Security in Action: Crypto Vulnerabilities (2:54)
Module 6 Review (11:50)
Module 7: Acing Your Exam
Module Introduction (0:38)
Lesson 38: Understanding the Security+ Exam Structure (2:43)
Lesson 39: Test Taking Strategies (3:38)
Lesson 40: The Week Leading Up to You Exam (2:58)
Lesson 41: What to Expect at the Testing Center (3:29)
Lesson 42: Attaining and Maintaining Your Security+ Certification (1:16)
Summary
CompTIA Security+ SY0-501: Summary (1:08)
29.1 Incident Response Plans
Lecture content locked
If you're already enrolled,
you'll need to login
.
Enroll in Course to Unlock