CompTIA Security+ SY0-701 Full Course and Labs - Druckversion +- Forum Rockoldies (https://rockoldies.net/forum) +-- Forum: Fotobearbeitung - Photoshop (https://rockoldies.net/forum/forumdisplay.php?fid=16) +--- Forum: E-Learning, Tutorials (https://rockoldies.net/forum/forumdisplay.php?fid=18) +--- Thema: CompTIA Security+ SY0-701 Full Course and Labs (/showthread.php?tid=84064) |
CompTIA Security+ SY0-701 Full Course and Labs - Panter - 14.05.2024 CompTIA Security+ SY0-701 Full Course and Labs Published 1/2024 MP4 | Video: h264, 1920x1080 | Audio: AAC, 44.1 KHz Language: English | Size: 47.83 GB | Duration: 25h 42m Pass your Security+ SY0-701 exam on the first try with a lab base approach to learning. Tons of labs. What you'll learn CompTIA Security+ exam objectives Attacks against networks Methods to protect a network Full length Mock Exam Requirements Basics Networking and skills. Description This course will prepare you to pass the CompTIA Security+ SY0-701 exam on the first try. In this course, I will be using my 20+ years of experience teaching IT courses to give you a practical, hands-on approach to all of the CompTIA Security+ Certification exams. I will cover all of the exam objectives in detail. I am a best-selling udemy instructor with over 300,000 students. I have helped thousands of students to pass their certification exams over the last 20 years. My method of teaching is engaging and fun.I will review how to build your own lab to follow along with me in this journey so you can gain the practical knowledge needed not only to pass your Security+ exam but also how to apply it in the real world of being an IT technician.This course will cover the following domains:Attacks, Threats, and VulnerabilitiesArchitecture and DesignImplementationOperations and Incident ResponseGovernance, Risk, and ComplianceThis course will include:Over 200 lectures.Over 25 Hours of training.We will only be covering the topics on your exam, no-nonsense and personal stories.PDF of the exam objectives from CompTIA for the Security+ exam. Certificate of completion. Lifetime access. 30-day money-back guarantee. Overview Section 1: Introduction Lecture 1 Exam Information Lecture 2 Exam Domains Lecture 3 Course Note Download Section 2: Lesson 1: IT Security Fundamentals Lecture 4 Introduction IT Security Fundamentals Lecture 5 CIA Triad OB 1.2 Lecture 6 Confidentiality OB 1.2 Lecture 7 Integrity OB 1.2 Lecture 8 Availability OB 1.2 Lecture 9 DAD Triade OB 1.2 Lecture 10 Non-Repudiation OB 1.2 Lecture 11 Authentication OB 1.2 Lecture 12 Authorization OB 1.2 Lecture 13 Accounting OB 1.2 Lecture 14 Accountability OB 1.2 Lecture 15 Gap analysis OB 1.2 Lecture 16 Zero Trust OB 1.2 Section 3: Security Controls Categories and Types Lecture 17 Control Categories OB 1.1 Lecture 18 Control Types OB 1.1 Lecture 19 Defense in Depth OB 1.1 Section 4: Threats Lecture 20 Threats OB 2.1 Lecture 21 Attributes of Actors OB 2.1 Lecture 22 Threats Motivation OB 2.1 Lecture 23 Nation-state OB 2.1 Lecture 24 Unskilled Attacker OB 2.1 Lecture 25 Hacktivist OB 2.1 Lecture 26 Organized Crime OB 2.1 Lecture 27 Shadow IT OB 2.1 Lecture 28 Threat Vectors and Attack Surfaces OB 2.2 Section 5: Vulnerabilities Lecture 29 Vulnerabilities OB 2.3 Lecture 30 Memory injection and buffer overflows OB 2.3 Lecture 31 Race Conditions OB 2.3 Lecture 32 Malicious Updates OB 2.3 Lecture 33 OS-Based Vulnerabilities OB 2.3 Lecture 34 SQL Injections OB 2.3 Lecture 35 XSS OB 2.3 Lecture 36 Hardware Vulnerabilities OB 2.3 Lecture 37 VM Vulnerabilities OB 2.3 Lecture 38 Cloud-specific Vulnerabilities OB 2.3 Lecture 39 Supply Chain Vulnerabilities OB 2.3 Lecture 40 Cryptographic Vulnerabilities OB 2.3 Lecture 41 Misconfiguration OB 2.3 Lecture 42 Mobile Device Vulnerabilities OB 2.3 Lecture 43 Zero-day Vulnerabilities OB 2.3 Section 6: Signs of Attacks Lecture 44 Malware OB 2.4 Lecture 45 Viruses OB 2.4 Lecture 46 Worms OB 2.4 Lecture 47 Trojans OB 2.4 Lecture 48 Ransomware OB 2.4 Lecture 49 Spyware OB 2.4 Lecture 50 Rootkit OB 2.4 Lecture 51 Logic Bomb OB 2.4 Lecture 52 Keyloggers OB 2.4 Lecture 53 Bloatware OB 2.4 Lecture 54 DDOS OB 2.4 Lecture 55 DNS OB 2.4 Lecture 56 Onpath Attack OB 2.4 Lecture 57 Credential Replay OB 2.4 Lecture 58 Privilege Escalation OB 2.4 Lecture 59 Request Forgery OB 2.4 Lecture 60 Directory Traversal OB 2.4 Lecture 61 Indicators of Malicious Activity OB 2.4 Section 7: Cryptography Lecture 62 Intro to cryptography OB 1.4 Lecture 63 Crypto Terms OB 1.4 Lecture 64 Goals Cryptography OB 1.4 Lecture 65 Algorithm vs Keys OB 1.4 Lecture 66 Ciphers OB 1.4 Lecture 67 Symmetric Encryption OB 1.4 Lecture 68 Symmetric Algorithms OB 1.4 Lecture 69 Asymmetric Encryption OB 1.4 Lecture 70 Asymmetric Algorithms OB 1.4 Lecture 71 Hybrid Cryptography OB 1.4 Lecture 72 Hashing OB 1.4 Lecture 73 Hashing Algorithms OB 1.4 Lecture 74 Digital Signatures OB 1.4 Lecture 75 Intro to PKI OB 1.4 Lecture 76 PKI Purpose OB 1.4 Lecture 77 SSL/TLS Handshake OB 1.4 Lecture 78 PKI Process OB 1.4 Lecture 79 Certificates OB 1.4 Lecture 80 PKI Root of Trust OB 1.4 Lecture 81 PKI Verification and Revocation OB 1.4 Lecture 82 Steganography OB 1.4 Lecture 83 Blockchain OB 1.4 Lecture 84 Salting OB 1.4 Lecture 85 TPM OB 1.4 Lecture 86 Secure Enclave OB 1.4 Lecture 87 Obfuscation OB 1.4 Lecture 88 Tokenization OB 1.4 Lecture 89 Key Escrow OB 1.4 Lecture 90 HSM OB 1.4 Section 8: Social Engineering Lecture 91 Social Engineering OB 2.2 Lecture 92 Phishing OB 2.2 Lecture 93 Vishing OB 2.2 Lecture 94 Smishing OB 2.2 Lecture 95 Spear Phishing OB 2.2 Lecture 96 Misinformation and Disinformation OB 2.2 Lecture 97 Impersonation OB 2.2 Lecture 98 Business Email Compromise OB 2.2 Lecture 99 Pretexting OB 2.2 Lecture 100 Watering Hole OB 2.2 Lecture 101 Brand Impersonation OB 2.2 Lecture 102 Typosquatting OB 2.2 Section 9: Securing IT Assets Lecture 103 Segmentation OB 2.5 Lecture 104 Isolation OB 2.5 Lecture 105 Access Control OB 2.5 Lecture 106 Principles of Least Privilege OB 2.5 Lecture 107 Access Control List OB 2.5 Lecture 108 Filesystem Permissions OB 2.5 Lecture 109 Application Allow List OB 2.5 Lecture 110 Patching OB 2.5 Lecture 111 Configuration Enforcement OB 2.5 Lecture 112 Decommissioning OB 2.5 Lecture 113 Monitoring OB 2.5 Lecture 114 Hardening Techniques OB 2.5 Section 10: Security Principles Lecture 115 Infrastructure Considerations OB 3.2 Lecture 116 Device Placement OB 3.2 Lecture 117 Security Zones OB 3.2 Lecture 118 Attack Surface OB 3.2 Lecture 119 Failure Modes OB 3.2 Lecture 120 Device Attributes OB 3.2 Lecture 121 Network Appliances and Sensors OB 3.2 Lecture 122 Jump Server OB 3.2 Lecture 123 Proxy Servers OB 3.2 Lecture 124 IDS/IPS OB 3.2 Lecture 125 Load Balancer OB 3.2 Lecture 126 802.1x and EAP OB 3.2 Lecture 127 Firewalls OB 3.2 Lecture 128 VPN OB 3.2 Lecture 129 SD-WAN OB 3.2 Lecture 130 Selecting Effective Controls OB 3.2 Section 11: Security Architecture Lecture 131 Cloud OB 3.1 Lecture 132 Infrastructure as Code OB 3.1 Lecture 133 Serverless Architecture OB 3.1 Lecture 134 Microservices OB 3.1 Lecture 135 Air Gapped OB 3.1 Lecture 136 Software-Defined Networking OB 3.1 Lecture 137 On-Premises OB 3.1 Lecture 138 Centralized vs. Decentralized OB 3.1 Lecture 139 Virtualization OB 3.1 Lecture 140 Containerization OB 3.1 Lecture 141 High Availability OB 3.1 Lecture 142 IoT OB 3.1 Lecture 143 ICS OB 3.1 Lecture 144 Security Architecture Considerations OB 3.1 Lecture 145 RTOS and Embedded Systems OB 3.1 Section 12: Data Protection Lecture 146 Regulated Data OB 3.3 Lecture 147 Intellectual Property OB 3.3 Lecture 148 Legal and Financial Data OB 3.3 Lecture 149 Data Classification OB 3.3 Lecture 150 Geolocation and Sovereignty OB 3.3 Lecture 151 Methods to Secure Data OB 3.3 Section 13: Common Security Techniques Lecture 152 Secure Baselines OB 4.1 Lecture 153 Hardening Devices OB 4.1 Lecture 154 Installations of Mobile Devices OB 4.1 Lecture 155 Mobile Solutions and MDM OB 4.1 Lecture 156 Mobile Connection Methods OB 4.1 Lecture 157 Wireless Security OB 4.1 Lecture 158 Application Security Methods OB 4.1 Lecture 159 Security Monitoring OB 4.1 Section 14: Hardware, software and Data Asset Management Lecture 160 Acquisition Procurement OB 4.2 Lecture 161 Assignment and Accounting OB 4.2 Lecture 162 Monitoring and Tracking OB 4.2 Lecture 163 Disposal and Decommission OB 4.2 Section 15: Vulnerability Management Lecture 164 Vulnerability Scan OB 4.3 Lecture 165 Application Security Testing OB 4.3 Lecture 166 Threat Feeds OB 4.3 Lecture 167 Penetration Testing OB 4.3 Lecture 168 Bug Bounty Program OB 4.3 Lecture 169 False Positive vs. False Negative OB 4.3 Lecture 170 CVE and CVSS OB 4.3 Lecture 171 Vulnerability Responses OB 4.3 Section 16: Alerting and Monitoring IT Lecture 172 Monitoring Resources OB 4.4 Lecture 173 Monitoring Activities OB 4.4 Lecture 174 Alerting and Monitoring Tools SIEM and DLP's OB 4.4 Section 17: Enhance Security Lecture 175 Firewall Configuration OB 4.5 Lecture 176 Web Filters OB 4.5 Lecture 177 Operating System Security OB 4.5 Lecture 178 Secure Protocols OB 4.5 Lecture 179 DNS Filter OB 4.5 Lecture 180 Email security OB 4.5 Lecture 181 File Integrity Monitoring OB 4.5 Lecture 182 Network Access Control OB 4.5 Lecture 183 EDR OB 4.5 Lecture 184 User Behavior Analytics OB 4.5 Section 18: Identity and Access Management (IAM) Lecture 185 Provisioning Users OB 4.6 Lecture 186 Single Sign-on OB 4.6 Lecture 187 Federation and SAML OB 4.6 Lecture 188 Access Control Models OB 4.6 Lecture 189 Multifactor Authentication OB 4.6 Lecture 190 Authentication tokens OB 4.6 Lecture 191 Biometric OB 4.6 Lecture 192 Password Management OB 4.6 Section 19: Automation and Orchestration Lecture 193 Automation and Orchestration OB 4.7 Section 20: Incident Response Lecture 194 Incident Response Steps OB 4.8 Lecture 195 Incident Response Training OB 4.8 Lecture 196 Digital Forensics OB 4.8 Section 21: Supporting an investigation Lecture 197 Types of logs OB 4.9 Section 22: Security Governance Lecture 198 Security Polices, Standards, Guidelines and Procedures OB 5.1 Lecture 199 Security Governance Considerations and Revisions OB 5.1 Lecture 200 Security Governance Structures OB 5.1 Lecture 201 Security Governance Roles OB 5.1 Section 23: Risk Management Lecture 202 Risk Terms OB 5.2 Lecture 203 Risk Identification and Assessment Times OB 5.2 Lecture 204 Quantitative and Qualitive Risk Assessment OB 5.2 Lecture 205 Risk Register OB 5.2 Lecture 206 Risk Appetite OB 5.2 Lecture 207 Risk Response OB 5.2 Lecture 208 Business Impact Assessment OB 5.2 Section 24: Vendor Management Lecture 209 Vendor Assessment and Selection OB 5.3 Lecture 210 Vendor Agreements OB 5.3 Section 25: Security Compliance Lecture 211 Compliance Reporting OB 5.4 Lecture 212 Privacy OB 5.4 Section 26: Audits and Assessments Lecture 213 Internal and External Assessments OB 5.5 Lecture 214 Penetration Test OB 5.5 Section 27: Security Awareness Training Lecture 215 Training against Phishing OB 5.6 Lecture 216 Security Awareness Program OB 5.6 Section 28: Physical Security Lecture 217 Physical Security Lecture 218 Deception and Disruption Technology Section 29: Changement Management Lecture 219 Change management OB 1.3 Lecture 220 Technical Implications OB 1.3 Section 30: Resilience and Recovery Lecture 221 High Availability OB 3.4 Lecture 222 Site Selection OB 3.4 Lecture 223 Capacity Planning OB 3.4 Lecture 224 Testing OB 3.4 Lecture 225 Backups OB 3.4 Lecture 226 Power OB 3.4 Section 31: Labs Lecture 227 Lab intro Lecture 228 Installing Windows on VirtualBox Lecture 229 Installing Kali Linux Lecture 230 Using Snapshots Lecture 231 Using an IP Scanner Lecture 232 Using the Nessus Vulnerability scanner Lecture 233 Cracking a Password with Kali Lecture 234 Cracking a password with a lookup table Lecture 235 Scanner a website for vulnerabilities Lecture 236 Using Wireshark to capture network traffic Lecture 237 Installing and Using SSH Lecture 238 Securing Windows with Password Complexity Lecture 239 Using Steganography to hide messages Lecture 240 Encrypting a hard drive Lecture 241 Implementing Role Based Access Control in Windows Lecture 242 Assigning Permissions to folders Lecture 243 Configure Firewall rules Lecture 244 Updating a Computer Lecture 245 Hardening a Desktop using group policy Lecture 246 Securing a wireless network Lecture 247 Using Encrypting File System Lecture 248 Backing up router configuration Lecture 249 Updating firmware on a router Lecture 250 Configuring a DMZ Lecture 251 Using tor network Lecture 252 Configuring VLAN's Lecture 253 Setting up an IPS Lecture 254 Configuring web filters Anyone looking to get CompTIA Security+ Certified Homepage |