Course Curriculum
- 15 sections
- 165 lectures
- 20 hours, 35 minutes total length
-
Introduction to CompTIA Security+ SY0-60100:03:00
-
About the CompTIA Security+ SY0-601 Exam00:03:00
-
Defining Risk00:08:00
-
Threats and Vulnerabilities00:07:00
-
Threat Intelligence00:11:00
-
Risk Management Concepts00:07:00
-
Security Controls00:09:00
-
Risk Assessments and Treatments00:06:00
-
Quantitative Risk Assessments00:07:00
-
Qualitative Risk Assessments00:04:00
-
Business Impact Analysis00:09:00
-
Data Types and Roles00:11:00
-
Security and the Information Life Cycle00:09:00
-
Data Destruction00:06:00
-
Personnel Risk and Policies00:10:00
-
Third-Party Risk Management00:09:00
-
Agreement Types00:07:00
-
Exam Question Review00:02:00
-
Wiping Disks with the dd Command Lab00:06:00
-
Ask Me Anything (AMA)00:02:00
-
Cryptography Basics00:16:00
-
Data Protection00:09:00
-
Cryptographic Methods00:07:00
-
Symmetric Cryptosystems00:13:00
-
Symmetric Block Modes00:08:00
-
Asymmetric Cryptosystems00:13:00
-
Diffie-Hellman00:07:00
-
Hashing00:09:00
-
Understanding Digital Certificates00:08:00
-
Trust Models00:05:00
-
Public Key Infrastructure00:04:00
-
Certificate Types00:14:00
-
Touring Certificates00:09:00
-
Cryptographic Attacks00:05:00
-
Password Cracking00:10:00
-
Password Cracking Demo00:06:00
-
Exam Question Review00:02:00
-
SSH Public Key Authentication Lab00:09:00
-
Ask Me Anything (AMA)00:02:00
-
Identification, Authentication, and Authorization00:08:00
-
Enabling Multifactor Authentication00:05:00
-
Authorization00:05:00
-
Accounting00:05:00
-
Authentication Methods00:14:00
-
Access Control Schemes00:07:00
-
Account Management00:13:00
-
Network Authentication00:09:00
-
Identity Management Systems00:06:00
-
Exam Question Review00:02:00
-
Creating LInux Users and Groups Lab00:06:00
-
Ask Me Anything (AMA)00:01:00
-
Touring the CLI00:16:00
-
Shells00:06:00
-
The Windows Command Line00:05:00
-
Microsoft PowerShell00:13:00
-
Linux Shells00:12:00
-
Python Scripts00:07:00
-
Windows Command-Line Tools00:16:00
-
Linux Command-Line Tools00:10:00
-
Network Scanners00:05:00
-
Network Scanning with Nmap00:09:00
-
Network Protocol Analyzers00:08:00
-
Using Wireshark to Analyze Network Traffic00:09:00
-
Using tcpdump to Analyze Network Traffic00:08:00
-
Log Files00:09:00
-
Centralized Logging00:09:00
-
Configuring Linux Log Forwarding00:08:00
-
Exam Question Review00:03:00
-
Lunux Shell Script Lab00:07:00
-
Nmap Lab00:05:00
-
Ask Me Anything (AMA)00:02:00
-
Malware00:14:00
-
Weak Configurations00:12:00
-
Common Attacks00:09:00
-
Driver and Overflow Attacks00:08:00
-
Password Attacks00:08:00
-
Bots and Botnets00:06:00
-
Disk RAID Levels00:10:00
-
Securing Hardware00:11:00
-
Securing Endpoints00:09:00
-
Exam Question Review00:02:00
-
Linux Software RAID Lab00:08:00
-
Ask Me Anything (AMA)00:02:00
-
The OSI Model00:13:00
-
ARP Cache Poisoning00:09:00
-
Other Layer 2 Attacks00:05:00
-
Network Planning00:07:00
-
Load Balancing00:06:00
-
Securing Network Access00:06:00
-
Honeypots00:06:00
-
Firewalls00:11:00
-
Proxy Servers00:06:00
-
Network and Port Address Translation00:07:00
-
IP Security (IPsec)00:09:00
-
Virtual Private Networks (VPNs)00:10:00
-
Intrusion Detection and Prevention Systems (IDS/IPS)00:13:00
-
Exam Question Review00:03:00
-
Linux Snort IDS Lab00:07:00
-
Ask Me Anything (AMA)00:01:00
-
Wi-Fi Encryption Standards00:10:00
-
RFID, NFC, and Bluetooth00:07:00
-
Wi-Fi Coverage and Performance00:08:00
-
Wi-Fi Discovery and Attacks00:12:00
-
Cracking WPA200:10:00
-
Wi-Fi Hardening00:11:00
-
Exam Question Review00:02:00
-
WPA2 Cracking Lab00:06:00
-
Ask Me Anything (AMA)00:01:00
-
Defining a Public Server00:01:00
-
Common Attacks and Mitigations00:10:00
-
Containers and Software-Defined Networking00:11:00
-
Hypervisors and Virtual Machines00:08:00
-
Cloud Deployment Models00:09:00
-
Cloud Service Models00:08:00
-
Securing the Cloud00:10:00
-
Exam Question Review00:02:00
-
Docker Container Lab00:04:00
-
Ask Me Anything (AMA)00:02:00
-
Embedded Systems00:13:00
-
Industrial Control System (ICS)00:07:00
-
Internet of Things (IoT) Devices00:10:00
-
Connecting to Dedicated and Mobile Systems00:11:00
-
Security Constraints for Dedicated Systems00:05:00
-
Mobile Device Deployment and Hardening00:11:00
-
Exam Question Review00:03:00
-
Smartphone Hardening Lab00:03:00
-
Ask Me Anything (AMA)00:02:00
-
Physical Security Overview00:01:00
-
Physical Security00:10:00
-
Keylogger Demo00:05:00
-
Environmental Controls00:05:00
-
Exam Question Review00:02:00
-
Physical Security Lab00:03:00
-
Ask Me Anything (AMA)00:03:00
-
DNS Security00:05:00
-
FTP Packet Capture00:03:00
-
Secure Web and E-mail00:02:00
-
Request Forgery Attacks00:05:00
-
Cross-Site Scripting Attacks00:07:00
-
Web Application Security01:20:00
-
Web App Vulnerability Scanning00:06:00
-
Exam Question Review00:03:00
-
OWASP ZAP Web App Scan Lab00:04:00
-
Ask Me Anything (AMA)00:02:00
-
Testing Infrastructure Overview00:05:00
-
Social Engineering00:06:00
-
Social Engineering Attacks00:11:00
-
Vulnerability Assessments00:09:00
-
Penetration Testing00:10:00
-
Security Assessment Tools00:12:00
-
The Metasploit Framework00:08:00
-
Exam Question Review00:02:00
-
Hping3 Forged Packet Lab00:06:00
-
Ask Me Anything (AMA)00:02:00
-
Incident Response Overview00:03:00
-
Incident Response Plans (IRPs)00:06:00
-
Threat Analysis and Mitigating Actions00:08:00
-
Digital Forensics00:12:00
-
Gathering Digital Evidence00:10:00
-
Business Continuity and Alternate Sites00:06:00
-
Data Backup00:10:00
-
Exam Question Review00:01:00
-
Autopsy Forensic Browser Lab00:05:00
-
Ask Me Anything (AMA)00:02:00
-
Claim Your Certificate