CompTIA Security+ SY0-501 Complete Video Course and Practice Test

CompTIA Security+ SY0-501 Complete Video Course and Practice Test
CompTIA Security+ SY0-501 Complete Video Course and Practice Test
English | MP4 | AVC 1280×720 | AAC 44KHz 2ch | 19h 45m | 8.05 GB

CompTIA Security+ (SY0-501) Complete Video Course is an engaging self-paced video training solution that provides learners with more than 19 hours of personal training from security expert Sari Greene. Through the use of topic-focused instructional videos, you will gain an in-depth understanding of each objective in the CompTIA Security+ (SY0-501) exam as well as a deeper understanding of security foundations and principles.

CompTIA Security+ (SY0-501) Complete Video Course contains more than 19 hours of training with content divided into 7 modules with more than 40 content-targeted lessons. This title covers every objective in the newly updated CompTIA Security+ SY0-501 exam and includes screencast teaching, whiteboard explanations, deep dives on security theory and everyday practices, and live demos/labs showing how to complete tasks in real time. Most lessons end with a “Security in Action” segment, which takes the security knowledge you’ve learned to the next level.

The video lessons in this course review each exam objective, so you can use it as a complete study tool for taking the CompTIA Security+ exam.

This course also includes

  • End-of-lesson quizzes
  • Performance-based exercises to help you learn and retain knowledge
  • A practice exam that runs in the Pearson test prep software

Major sections are as follows:

  • Threats, Attacks and Vulnerabilities
  • Tools and Technologies
  • Architecture and Design
  • Identity and Access Management
  • Risk Management
  • Cryptography and PKI
  • Acing the Exam

What You Will Learn

  • Every objective on the CompTIA Security+ exam
  • Tips to prepare for and pass the exam
  • Real-world security configuration skills
Table of Contents

1 CompTIA Security+ SY0-501 – Introduction
2 Module Introduction
3 Learning objectives
4 1.1 Types of Malware
5 1.2 Indicators of Compromise
6 1.3 Security in Action – Malware IOC
7 Learning objectives
8 2.1 Anticipating Cyber Attacks
9 2.2 Social Engineering
10 2.3 Application and Service Attacks
11 2.4 Wireless Attacks
12 2.5 Security in Action – Typo Squatting
13 Learning objectives
14 3.1 Actor Types and Attributes
15 3.2 Open Source Threat Intelligence (OSINT)
16 3.3 Security in Action – Open Source Intelligence
17 Learning objectives
18 4.1 Pen Testing Concepts
19 4.2 Pen Testing Techniques
20 4.3 Security in Action – Passive Recon
21 Learning objectives
22 5.1 Scanning Techniques
23 5.2 Common Findings
24 5.3 Security in Action – Port Scanning
25 Learning objectives
26 6.1 Business Process Vulnerabilities
27 6.2 Source Code Vulnerabilities
28 6.3 Security in Action – Impact of End of Life Systems
29 Module 1 Review
30 Module Introduction
31 Learning objectives
32 7.1 Firewalls
33 7.2 Filters and Proxies
34 7.3 IDS and IPS
35 7.4 Virtual Private Networks
36 7.5 Layer 1 and 2 Devices
37 7.6 Routers and Load Balancers
38 7.7 Access Points
39 7.8 NACs, DLPs, and Mail Gateways
40 7.9 SIEM
41 7.10 Security in Action – Firewall Rule
42 Learning objectives
43 8.1 Security Scanners and Analyzers
44 8.2 Command Line Tools
45 8.3 Security in Action – Demonstrate Nmap
46 Learning objectives
47 9.1 Configuration and Operational Issues
48 9.2 Personnel Issues
49 9.3 Security in Action – Root Cause Analysis (5 Whys)
50 Learning objectives
51 10.1 Activity and Error Reporting
52 10.2 Security in Action – Local Host Reporting
53 Learning objectives
54 11.1 Mobile Connection Methods
55 11.2 Mobile Device Management
56 11.3 Mobile Device Concerns
57 11.4 Security in Action – Mobile Device Ownership
58 Learning objectives
59 12.1 Secure Communication Protocols
60 12.2 Secure Network and Administration Protocols
61 12.3 Security in Action – Packet Capture and Protocol Analyzer
62 Module 2 Review
63 Module Introduction
64 Learning objectives
65 13.1 Frameworks, Benchmarks, and Guides
66 13.2 Security in Action – Configuration Guidance
67 Learning objectives
68 14.1 Zones
69 14.2 Isolation
70 14.3 Device Placement
71 14.4 Security in Action – Secure Enclave & Air Gapping
72 Learning objectives
73 15.1 Hardware _ Firmware Security
74 15.2 Operating System Security
75 15.3 Security in Action – Hardening an Operating System
76 Learning objectives
77 16.1 Staging and Deployment Strategies
78 16.2 Security in Action – Staging Process
79 Learning objectives
80 17.1 Embedded System Security
81 17.2 Security in Action – Available Resources
82 Learning objectives
83 18.1 Development Lifecycle
84 18.2 Secure Coding Techniques
85 18.3 Code Quality and Testing
86 18.4 Security in Action – Code Attacks
87 Learning objectives
88 19.1 Virtualization
89 19.2 Cloud Service and Deployment Models
90 19.3 Security in Action – Workstation Virtualization
91 Learning objectives
92 20.1 Automation and Persistence Techniques
93 20.2 Redundancy and Fault Tolerance
94 20.3 Security in Action – RAID
95 Learning objectives
96 21.1 Building and Facility Security
97 21.2 Environment Controls
98 21.3 Security in Action – CPTED
99 Module 3 Review
100 Module Introduction
101 Learning objectives
102 22.1 Identification and Authentication
103 22.2 Identity Management
104 22.3 Security in Action – Transitive Trust
105 Learning objectives
106 23.1 Network Identity and Access Services
107 23.2 Web Identity and Access Services
108 23.3 Security in Action – OAuth 2.0
109 Learning objectives
110 24.1 Authentication Controls
111 24.2 Access Control Models
112 24.3 Security in Action – DAC Permissions
113 Learning objectives
114 25.1 Account Types
115 25.2 General Concepts
116 25.3 Account Auditing
117 25.4 Security in Action – Account Policy Enforcement
118 Module 4 Review
119 Module Introduction
120 Learning objectives
121 26.1 Security Policies and Agreements
122 26.2 Personnel Management
123 26.3 Security Awareness Training
124 26.4 Security in Action – Policies, Standards and Procedures
125 Learning objectives
126 27.1 Business Impact Analysis
127 27.2 Privacy Impact and Threshold Assessments
128 27.3 Security in Action – BIA Metrics
129 Learning objectives
130 28.1 Risk Management
131 28.2 Risk Assessments
132 28.3 Testing and Change Management
133 28.4 Security in Action – Quantitative Risk Assessment
134 Learning objectives
135 29.1 Incident Response Plans
136 29.2 Incident Response Process
137 29.3 Security in Action – IR Response Creating a Playbook
138 Learning objectives
139 30.1 Forensic Fundamentals
140 30.2 Data Acquisition
141 30.3 Security in Action – Forensic Techniques
142 Learning objectives
143 31.1 Recovery and Restoration
144 31.2 Continuity of Operations Planning
145 31.3 Security in Action – Site Selection Decision Tree
146 Learning objectives
147 32.1 Comparing and Contrasting Controls
148 32.2 Security in Action – Technical Control Crossover
149 Learning objectives
150 33.1 Data Protection and Classification
151 33.2 Data Retention and Destruction
152 33.3 Security in Action – Disk Wiping
153 Module 5 Review
154 Module Introduction
155 Learning objectives
156 34.1 Cryptography Basics
157 34.2 Steganography
158 34.3 Security in Action – Basic Steganography
159 Learning objectives
160 35.1 Symmetric Encryption
161 35.2 Asymmetric Encryption
162 35.3 Hashing
163 35.4 Digital Signatures
164 35.5 Security in Action – Hashing
165 Learning objectives
166 36.1 Wireless Cryptographic Protocols
167 36.2 Security in Action – WPS Issues
168 Learning objectives
169 37.1 Digital Certificates
170 37.2 Key Lifecycle Managment
171 37.3 Cryptographic Attacks
172 37.4 Security in Action – Crypto Vulnerabilities
173 Module 6 Review
174 Module Introduction
175 Lesson 38 – Understanding the Security+ Exam Structure
176 Lesson 39 – Test Taking Strategies
177 Lesson 40 – The Week Leading Up to You Exam
178 Lesson 41 – What to Expect at the Testing Center
179 Lesson 42 – Attaining and Maintaining Your Security+ Certification
180 CompTIA Security+ SY0-501 – Summary