Get $1 credit for every $25 spent!

The 2022 Premium CompTIA CyberSecurity & Security+ Exam Prep Bundle

Ending In:
Add to Cart - $30
Add to Cart ($30)
$1,200
97% off
wishlist
Courses
6
Lessons
1,313

What's Included

Product Details

Access
Lifetime
Content
10.0 hours
Lessons
67

CompTIA PenTest+ (PT0-001) Ethical Hacking: The Total Course

Hone Your Cybersecurity Skills with Hands-On Abilities in Penetration Testing & Vulnerability Management

By Total Seminars | in Online Courses

Penetration testing and information security are some of the fastest-growing job categories according to the U.S. Bureau of Labor Statistics. Whether you're looking to pass the CompTIA PenTest+ certification exam, take your next step in the CompTIA Cybersecurity Pathway, or you're just looking to learn some awesome ethical hacking skills, you’re in the right place. This course focuses on how to be a pentester. A pen tester plans and scopes a pen test engagement with a client, finds vulnerabilities, exploits them to get into a network, then reports on those findings to the client.

4.7/5 average rating: ★ ★ ★ ★

  • Access 67 lectures & 10 hours of content 24/7
  • Scan networks, crack passwords, analyze & intercept traffic
  • Discover code vulnerabilities & compromise resources
  • Recognize vulnerabilities within a system, run exploits, & suggest solutions to a client to remediate the weak points
  • Work within a virtual environment to practice your pen testing skills, including using Oracle VM manager, Kali Linux, Metasploitable, & DVWA
  • Scope, plan, & execute a pen test engagement from start to finish
Total Seminars | Home of Mike Meyers & His Team of IT Certification Pros
4.7/5 Instructor Rating: ★ ★ ★ ★

Total Seminars provides certification training services and training materials to thousands of schools, corporations, and government agencies including the United Nations, the FBI, and all branches of the Department of Defense. Total Seminars produces the #1 selling CompTIA A+ and Network+ Certification books with over 1 million books in print.

Total Seminars has created a number of “Best-Selling” video courses by Mike Meyers and the Total Seminars team of Instructors. They also develop supplemental materials such as the TotalTester certification practice tests and TotalSims lab simulations to support your certification preparation. These are available on the Total Seminars website.

Important Details

  • Length of time users can access this course: lifetime
  • Access options: desktop & mobile
  • Redemption deadline: redeem your code within 30 days of purchase
  • Experience level required: all levels
  • Have questions on how digital purchases work? Learn more here

Requirements

  • Any device with basic specifications

Course Outline

  • Your First Program
  • Introduction to PenTest+
    • Welcome to CompTIA PenTest+ (PT0-001) Ethical Hacking - 8:40
  • Chapter 1: Planning and Scoping
    • Planning a Pen Test - 8:54
    • Rules of Engagement - 10:41
    • Resources and Budgets - 7:21
    • Impact and Constraints - 5:17
    • Support Resources - 13:26
    • Legal Groundwork - 11:57
    • Scope Considerations - 10:51
    • Lab Environment Setup - 22:56
    • Project Strategy and Risk - 9:24
    • Scope Vulnerabilities - 13:32
    • Compliance-Based Assessments - 5:25
  • Chapter 2: Surveying the Target
    • Scanning and Enumeration - 4:35
    • Scanning and Enumeration Demo - 10:59
    • Packet Investigation - 8:03
    • Packet Inspection Demo - 6:02
    • Application and Open-Source Resources - 11:52
    • Vulnerability Scanning - 8:50
    • Vulnebarility Scanning Demo - 16:31
    • Target and Asset Considerations - 15:39
    • Nmap Timing and Performance Options - 6:43
    • Prioritization of Vulnerabilities - 9:17
    • Common Attack Techniques - 12:17
    • Credential Attacks - 14:41
    • Weaknesses in Specialized Systems - 18:08
  • Chapter 3: Selecting Your Attack Vector
    • Remote Social Engineering - 6:50
    • Spear Phishing Demo - 10:19
    • In-Person Social Engineering - 12:00
    • Network-Based Exploits - 7:19
    • FTP Exploit Demo - 8:28
    • Man-in-the Middle Exploits - 7:18
    • Wireless Exploits - 13:29
    • Application Exploits, Part 1 - 5:41
    • SQL Injection Demo - 8:48
    • Application Exploits, Part 2 - 8:14
    • Application Exploits, Part 3 - 9:15
    • Cross-Site Scripting Demo - 7:11
    • Code Vulnerabilities - 16:48
    • Local Host Vulnerabilities - 5:08
    • Privilege Escalation (Linux) - 9:49
    • Privilege Escalation (Windows) - 6:17
    • Misc. Privilege Escalation - 8:07
    • Misc. Local Host Vulnerabilities - 8:17
    • Physical Security - 11:27
    • Post-Exploitation Techniques - 11:23
    • Persistence and Stealth - 10:55
  • Chapter 4: Selecting Pen Testing Tools
    • Nmap Scoping and Output Options - 21:15
    • Pen Testing Toolbox - 6:59
    • Using Kali Linux - 6:27
    • Scanners and Credential Tools - 10:22
    • Code Cracking Tools - 4:35
    • Open-Source Research Tools - 6:36
    • Wireless and Web Pen Testing Tools - 11:03
    • Remote Access Tools - 6:28
    • Analyzers and Mobile Pen Testing Tools - 2:43
    • Other Pen Testing Tools - 4:39
    • Using Scripting in Pen Testing - 12:46
    • Bash Scripting Basics - 15:10
    • Bash Scripting Techniques - 10:21
    • PowerShell Scripts - 4:16
    • Ruby Scripts - 6:43
    • Python Scripts - 5:59
    • Scripting Languages Comparison - 11:06
  • Chapter 5: Reporting and Communication
    • Writing Reports - 16:02
    • Post-Report Activities - 5:36
    • Mitigation Strategies - 5:13
    • Communication - 9:54

View Full Curriculum


Access
Lifetime
Content
7.0 hours
Lessons
51

CompTIA CySA+ Cybersecurity Analyst (CS0-001): The Total Course

Ace the High-Stakes Security Analyst Certification & Become a Well-Respected Professional in the Cybersecurity Field

By Total Seminars | in Online Courses

Properly trained IT security staff who can analyze, monitor, and protect cybersecurity resources are in high demand. The U.S. Bureau of Labor Statistics (BLS) predicts that information security analysts will be the fastest-growing overall job category, with 37 percent overall growth between 2012 and 2022. And if you're aiming to stack your resumé with a recognized certification and earn big bucks as a security analyst, this course is for you. With 51 lectures, this class will teach you everything you need to know to respond to cybersecurity threats and attacks. It will make you an outstanding cybersecurity analyst and in the process, make sure you are ready to pass the CompTIA exam.

4.6/5 average rating: ★ ★ ★ ★

  • Access 51 lectures & 7 hours of content 24/7
  • Apply environmental reconnaissance techniques like OS fingerprinting, e-mail harvesting, & social media profiling using tools such as Nmap, Netstat, and Syslog
  • Analyze the results of network reconnaissance, & recommend or implement countermeasures
  • Secure a corporate environment by scanning for vulnerabilities
  • Respond to cyber incidents w/ a forensics toolkit, maintain the chain of custody, & analyze incident severity
Total Seminars | Home of Mike Meyers & His Team of IT Certification Pros
4.7/5 Instructor Rating: ★ ★ ★ ★

Total Seminars provides certification training services and training materials to thousands of schools, corporations, and government agencies including the United Nations, the FBI, and all branches of the Department of Defense. Total Seminars produces the #1 selling CompTIA A+ and Network+ Certification books with over 1 million books in print.

Total Seminars has created a number of “Best-Selling” video courses by Mike Meyers and the Total Seminars team of Instructors. They also develop supplemental materials such as the TotalTester certification practice tests and TotalSims lab simulations to support your certification preparation. These are available on the Total Seminars website.

Important Details

  • Length of time users can access this course: lifetime
  • Access options: desktop & mobile
  • Redemption deadline: redeem your code within 30 days of purchase
  • Experience level required: intermediate
  • Have questions on how digital purchases work? Learn more here

Requirements

  • Any device with basic specifications

Course Outline

  • Introduction to CySA+
    • Introduction - 1:50
  • Conducting Reconnaissance
    • Thinking Like the Enemy - 9:20
    • Tools of the Trade - 7:35
  • Analyzing Reconnaissance Results
    • Recon Results: Part 1 - 13:06
    • Recon Results: Part 2 - 4:52
    • Data Output - 5:01
  • Responding to Network-Based Threats
    • Protecting Your Territory - 4:53
    • Hardening Strategies - 12:42
  • Securing a Corporate Environment
    • Pen Testing - 5:42
    • Training - 4:03
    • Reverse Engineering - 7:42
    • Risk Evaluation - 2:34
  • Vulnerability Management
    • Requirements Identification - 4:50
    • Scanning - 5:49
    • Configuring and Executing Scans - 7:47
    • Reporting and Remediating - 9:24
  • Analyzing Vulnerabilities Scan Results
    • Common Vulnerabilities: Part 1 - 7:58
    • Common Vulnerabilities: Part 2 - 7:50
  • Incident Response
    • Incident Response Process - 6:40
    • IR Roles and Responsibilities - 7:43
  • Preparation Phase
    • IR Active Preparation - 9:45
    • Threat Trends - 7:35
  • Forensic Tools
    • Digital Forensics - 9:37
    • Seizure and Acquisitions - 4:56
    • Forensics Acquisition Tools - 8:57
    • Forensics Analysis: Part 1 - 4:29
    • Forensics Analysis: Part 2 - 7:51
  • Common Symptoms of Compromise
    • Network Symptoms - 3:34
    • Host Symptoms - 8:07
    • Application Symptoms - 4:27
  • Incident Recovery and Post-Incident Response Process
    • Moving Forward: Part 1 - 13:06
    • Moving Forward: Part 2 - 8:02
  • Frameworks, Common Policies, Controls, and Procedures
    • Frameworks - 13:06
    • Policies - 7:31
    • Controls & Procedures - 7:44
    • Verifications - 6:16
  • Identity and Access Management
    • Context-Based Authentication - 6:20
    • Identities - 15:17
    • Managing Identities - 9:43
    • Exploits - 8:12
  • Defense Strategies
    • Data Analytics - 9:48
    • Defense in Depth - 14:14
  • Software Development Life Cycle (SDLC)
    • Secure Software Development - 7:47
    • Best Coding Practices - 4:12
  • Tools and Technologies
    • Preventative Tools: Part 1 - 20:35
    • Preventative Tools: Part 2 - 6:20
    • Collective Tools - 8:57
    • Vulnerability Scanning - 15:54
    • Packet Capture - 11:40
    • Connectivity Tools - 8:00
    • Pen Testing Tools - 11:55

View Full Curriculum


Access
Lifetime
Content
10.0 hours
Lessons
111

TOTAL: CompTIA CySA+ Cybersecurity Analyst (CS0-002)

Learn the Basics of Cloud Computing & Prepare for the CompTIA Cloud+ Certification Exam

By Total Seminars | in Online Courses

Are you looking to get into the exciting world of hackers, cybersecurity, threat hunting, and digital forensics? Do you find the idea of gathering and analyzing intelligence to detect and combat hackers intriguing? Then this is the course for you! This course is aimed at the aspirational junior analyst looking to step up in their career. However, if your tech skills don't include cybersecurity, you can also gain a great deal of knowledge from this course to help launch yourself towards a career in cybersecurity.

4.6/5 average rating: ★ ★ ★ ★

  • Access 111 lectures & 10 hours of content 24/7
  • Leverage intelligence & threat detection techniques
  • Analyze & interpret data
  • Identify & address vulnerabilities
  • Suggest preventative measures
  • Effectively respond to & recover from incidents
  • Analyze the results of network reconnaissance & recommend or implement countermeasures
  • Secure a corporate environment
Total Seminars | Home of Mike Meyers & His Team of IT Certification Pros
4.7/5 Instructor Rating: ★ ★ ★ ★

Total Seminars provides certification training services and training materials to thousands of schools, corporations, and government agencies including the United Nations, the FBI, and all branches of the Department of Defense. Total Seminars produces the #1 selling CompTIA A+ and Network+ Certification books with over 1 million books in print.

Total Seminars has created a number of “Best-Selling” video courses by Mike Meyers and the Total Seminars team of Instructors. They also develop supplemental materials such as the TotalTester certification practice tests and TotalSims lab simulations to support your certification preparation. These are available on the Total Seminars website.

Important Details

  • Length of time users can access this course: lifetime
  • Access options: desktop & mobile
  • Redemption deadline: redeem your code within 30 days of purchase
  • Experience level required: intermediate
  • Have questions on how digital purchases work? Learn more here

Requirements

  • Any device with basic specifications

Course Outline

  • Chapter 1: The Importance of Threat Data and Intelligence
    • Intelligence Sources and Confidence Levels - 7:57
    • Threat Indicators and Actors - 7:59
    • Threat Trends - 6:50
    • Intelligence Cycle and ISACs - 6:15
    • Chapter 1: The Importance of Threat Data and Intelligence Quiz
  • Chapter 2: Threat Intelligence in Support of Organizational Security
    • Attack Frameworks - 6:15
    • Threat Research - 11:09
    • Threat Modeling and Intelligence Sharing - 5:33
    • Chapter 2: Threat Intelligence in Support of Organizational Security Quiz
  • Chapter 3: Vulnerability Assessment Tools
    • Vulnerability Identification - 7:25
    • Scanning Parameters and Criteria - 9:13
    • Scanning Special Considerations - 5:36
    • Validation - 3:26
    • Remediation and Mitigation - 7:49
    • Inhibitors to Remediation - 6:58
    • Chapter 3: Vulnerability Assessment Tools Quiz
  • Chapter 4: Threats and Vulnerabilities Associated with Specialized Technology
    • Web Applications Scanners, Part 1 - 9:34
    • Web Applications Scanners, Part 2 - 5:12
    • Scanning - 5:45
    • Configuring and Executing Scans - 7:42
    • Vulnerability Scanning - 9:46
    • Reverse Engineering - 7:37
    • Enumeration - 6:21
    • Wireless Assessment Tools - 7:39
    • Cloud Assessment Tools - 3:35
    • Chapter 4: Threats and Vulnerabilities Associated with Specialized Technology Quiz
  • Chapter 5: Threats and Vulnerabilities Associated with Specialized Technology
    • Mobile and IoT - 9:48
    • Embedded and Firmware Systems (RTOS, SoC, and FPGA) - 9:18
    • Access and Vehicles Risk - 8:01
    • Automation and Control Risk - 10:03
    • Chapter 5: Threats and Vulnerabilities Associated with Specialized Technology Quiz
  • Chapter 6: Threats and Vulnerabilities Associated with Operating in the Cloud
    • Cloud Models - 6:38
    • Remote Service Invocation (FaaS, IaC, API) - 9:32
    • Cloud Vulnerabilities - 6:10
    • Chapter 6: Threats and Vulnerabilities Associated with Operating in the Cloud
  • Chapter 7: Mitigating Controls for Attacks and Software Vulnerabilities
    • Injection and Overflow Attacks - 9:25
    • Authentication Attacks - 6:33
    • Exploits - 8:08
    • Application Vulnerabilities, Part 1 - 7:37
    • Application Vulnerabilities, Part 2 - 6:57
    • Chapter 7: Mitigating Controls for Attacks and Software Vulnerabilities Quiz
  • Chapter 8: Security Solutions for Infrastructure Management
    • Network Architecture and Asset Management - 8:50
    • Protecting Your Territory - 4:49
    • Identity and Access Management - 11:17
    • Encryption and Active Defense - 8:26
    • Chapter 8: Security Solutions for Infrastructure Management Quiz
  • Chapter 9: Software Assurance Best Practices
    • Platforms - 7:00
    • SOA and DevSecOps - 8:44
    • Secure Software Development - 7:43
    • Best Coding Practices - 4:08
    • Chapter 9: Software Assurance Best Practices Quiz
  • Chapter 10: Hardware Assurance Best Practices
    • Trusted Hardware - 9:43
    • Hardware Encryption - 4:28
    • Hardware Security - 7:44
    • Chapter 10: Hardware Assurance Best Practices Quiz
  • Chapter 11: Data Analysis in Security Monitoring Activities
    • Data Analytics - 9:44
    • Endpoint Security - 7:32
    • Recon Results, Part 1 - 13:01
    • Recon Results, Part 2 - 4:47
    • Impact Analysis - 4:30
    • Collective Tools - 8:53
    • Query Writing - 6:43
    • E-mail Analysis, Part 1 - 9:30
    • E-mail Analysis, Part 2 - 7:56
    • Chapter 11: Data Analysis in Security Monitoring Activities Quiz
  • Ch12: Implement Configuration Changes to Existing Controls to Improve Security
    • Permissions - 8:50
    • Firewalls - 7:30
    • Intrusion Prevention Rules - 5:16
    • DLP and Endpoint Detection - 4:57
    • Chapter 12: Implement Configuration Changes to Existing Controls to Improve Security Quiz
  • Chapter 13: The Importance of Proactive Threat Hunting
    • Threat Hunting and the Hypothesis - 6:26
    • Threat Hunting Process - 7:14
    • Results and Benefits - 4:54
    • Chapter 13: The Importance of Proactive Threat Hunting Quiz
  • Chapter 14: Compare and Contrast Automation Concepts and Technologies
    • Workflow and Scripting - 7:27
    • API and Malware Signature Creation - 7:46
    • Threat Feeds and Machine Learning - 6:02
    • Protocols, Standards, and Software Engineering - 5:15
    • Chapter 14: Compare and Contrast Automation Concepts and Technologies Quiz
  • Chapter 15: The Importance of the Incident Response Process
    • IR Roles and Responsibilities - 7:38
    • IR Active Preparation - 9:41
    • Chapter 15: The Importance of the Incident Response Process Quiz
  • Chapter 16: Appropriate Incident Response Procedures
    • Incident Response Process - 6:36
    • Chapter 16: Appropriate Incident Response Procedures Quiz
  • Chapter 17: Analyze Potential Indicators of Compromise
    • Network Symptoms - 3:30
    • Host Symptoms - 8:03
    • Application Symptoms - 4:22
    • Chapter 17: Analyze Potential Indicators of Compromise Quiz
  • Chapter 18: Utilize Basic Digital Forensics Techniques
    • Digital Forensics - 9:33
    • Seizure and Acquisitions - 4:52
    • Forensics Acquisition Tools - 8:52
    • Mobile, Virtualization, and Cloud - 5:51
    • Forensics Analysis, Part 1 - 4:24
    • Forensics Analysis, Part 2 - 7:46
    • Packet Capture - 11:36
    • Chapter 18: Utilize Basic Digital Forensics Techniques Quiz
  • Chapter 19: The Importance of Data Privacy and Protection
    • Data Privacy and Security - 6:13
    • Nontechnical Controls - 8:47
    • Technical Controls - 7:48
    • Chapter 19: The Importance of Data Privacy and Protection Quiz
  • Chapter 20: Security Concepts in Support of Organizational Risk Mitigation
    • Business Impact Analysis - 4:30
    • Risk Identification - 5:18
    • Risk Calculation and Communication - 6:10
    • Training - 3:59
    • Supply Chain Assessment - 4:12
    • Chapter 20: Security Concepts in Support of Organizational Risk Mitigation Quiz
  • Chapter 21: The Importance of Frameworks, Policies, Procedures, and Controls
    • Frameworks - 13:01
    • Policies and Procedures - 4:29
    • Controls and Procedures - 7:39
    • Verification - 6:11
    • Chapter 21: The Importance of Frameworks, Policies, Procedures, and Controls Quiz

View Full Curriculum


Access
Lifetime
Content
12.0 hours
Lessons
266

CompTIA Advanced Security Practitioner (CAS-003)

Fight Back Against Today's Cyber Threats & Secure Enterprise Networks

By Integrity Training | in Online Courses

The CompTIA Advanced Security Practitioner course is a preparatory course for the exam CAS-003 conducted by The Computing Technology Industry Association (CompTIA). It covers the exam topics in detail and prepares the students in risk management, enterprise security operations and architecture, research and collaboration, and enterprise security integration. This certification course covers the technical knowledge and skills required to conceptualize, design, and engineer secure solutions across complex enterprise environments.

4.6/5 average rating: ★ ★ ★ ★

  • Access 266 lectures & 12 hours of content 24/7
  • Be prepared in areas of risk management, enterprise security & architecture, research & collaborations, and more
  • Acquire technical knowledge & skills required to conceptualize, design, and engineer solutions
  • Apply critical thinking & judgment across a broad spectrum of security disciplines
  • Propose & implement solutions that map enterprise drivers, while managing risks
Integrity Training, Certification Trainers for Over 20 Years
4.3/5 Instructor Rating: ★ ★ ★ ★

Integrity Training provides the corporate, government, and education sectors with proven on-demand training for employees. With 20 years in the business, over 600 online training courses, and over 1.2 million students taking the courses, Integrity Training is a name you can trust in workforce training.

Important Details

  • Length of time users can access this course: lifetime
  • Access options: desktop & mobile
  • Redemption deadline: redeem your code within 30 days of purchase
  • Experience level required: advanced
  • Have questions on how digital purchases work? Learn more here

Requirements

  • Minimum of 10 years of experience in IT administration with at least 5 years of hands-on technical security experience

Course Outline

  • Course Introduction
    • Course Introduction - 3:22
    • Instructor Introduction - 1:34
  • Chapter 01 - Understanding Risk Management
    • Chapter Introduction - 2:15
    • Topic A: Understanding Business and Industry Influences - 0:10
    • Ongoing Risk Management - 1:16
    • New Products and User Behaviors - 3:43
    • Business Models and Strategies - 3:25
    • Cloud Technologies - 4:47
    • Acquisitions and Mergers - 3:08
    • Due Diligence Team - 1:05
    • Data Ownership - 1:30
    • Data Reclassification - 1:00
    • Integrating Diverse Industries - 5:01
    • Common Regulations - 5:08
    • Geographic Differences - 2:25
    • Data Sovereignty - 0:53
    • Internal and External Influences - 5:32
    • De-perimeterization - 1:07
    • Understand Changes in Network Boundaries - 6:53
    • Topic B: Policies and Procedures - 0:22
    • Understanding Policies and Procedures - 1:34
    • Policy Life Cycle - 1:28
    • Process Life Cycle - 1:30
    • Reviewing Policies and Processes - 3:45
    • Common Business Documents - 4:44
    • Security for Contracts - 1:14
    • Contract Requirements - 1:54
    • General Privacy Principles - 1:13
    • Standard Security Practices - 11:28
    • Demo - Examining Security Policies - 7:11
    • Topic C: Risk Mitigation and Control - 0:24
    • Introduction to Risk Mitigation - 1:00
    • Categorizing Data - 3:48
    • Incorporating Stakeholder Input - 1:18
    • Aggregate CIA Scores - 1:36
    • Selecting and Implementing Controls - 4:11
    • Security Control Frameworks - 0:51
    • Options for Frameworks - 4:40
    • Extreme Scenario Planning - 2:41
    • System-Specific Risk Analysis - 1:13
    • Qualitative Risk Analysis - 1:39
    • Quantitative Risk Analysis - 1:05
    • Risk Impact - 3:08
    • Likelihood of Threat - 0:48
    • Return on Investment - 1:52
    • Understanding Payback - 2:05
    • Total Cost of Ownership - 1:24
    • TCO Guidelines - 1:23
    • Translate to Business Terms - 1:31
    • Risk Management Strategies - 2:09
    • Risk Management Processes - 1:06
    • Information and Asset Value and Costs - 0:49
    • Vulnerabilities and Threat Identification - 1:06
    • Additional Factors - 1:34
    • Topic D: Business Continuity Planning - 0:21
    • Continuity Planning - 0:19
    • BCP Components - 1:51
    • BCP Steps - 2:38
    • Additional Plans - 1:48
    • Conducting Business Impact Analysis - 4:57
    • Chapter 01 Review - 1:03
    • Quiz 1
  • Chapter 02 - Network and Security Components and Architecture
    • Chapter Introduction - 0:34
    • Topic A: Physical and Virtual Network Security Devices - 0:15
    • Unified Threat Management - 1:18
    • Analyzing UTM - 1:31
    • Intrusion Detection and Prevention - 5:13
    • In-Line Network Encryptor - 1:31
    • Network Access Control - 3:02
    • SIEM - 1:15
    • Firewalls - 7:05
    • Firewall Architecture - 5:16
    • Wireless Controller - 1:49
    • Routers and Switches - 2:09
    • Proxy Servers - 1:30
    • Topic B: Application and Protocol Level Security - 0:29
    • Web Application Firewalls - 1:46
    • Hardware Security Modules - 1:50
    • Vulnerability Scanners - 2:11
    • Topic C: Advanced Network Design - 0:31
    • Virtual Private Networks - 2:51
    • VPN Protocols - 1:58
    • IP Security (IPSec) - 3:01
    • IPSec Modes - 1:02
    • Demo - Examining IPSec Policies - 9:28
    • Secure Sockets Layer (SSL) - 1:44
    • Transport Layer Security (TLS) - 1:00
    • Additional Security Protocols - 3:25
    • Authentication Protocols - 4:45
    • Topic D: Network Solutions for Data Flow - 0:36
    • Data Loss Prevention ' - 2:48
    • Data Flow Enforcement - 2:00
    • Network Flow - 1:32
    • Topic E: Secure Baselines of Networking and Security Components - 0:30
    • Securing Device Configurations - 0:25
    • Access Control Lists (ACLs) - 0:42
    • ACL Rule Sets - 2:04
    • Change Monitoring - 1:30
    • Configuration Lockdown - 0:51
    • Availability Controls - 3:29
    • Disk Availability - 3:56
    • Key Availability Terms - 1:25
    • Topic F: Advanced Configuration of Network Devices - 0:16
    • Additional Configurations - 0:49
    • Transport Security - 1:44
    • Trunking Security - 3:47
    • Port Security - 2:20
    • Ports and Sockets - 3:37
    • Security Zones - 1:29
    • Network Segmentation - 1:24
    • Network Access Control - 2:52
    • NAC Concepts - 2:53
    • Network Enabled Devices - 2:20
    • Automation Systems - 1:23
    • Physical Security - 2:17
    • Chapter 02 Review - 1:16
    • Quiz 2
  • Chapter 03 - Implementing Advanced Authentication and Cryptographic Techniques
    • Chapter Introduction - 0:56
    • Topic A: Understanding Authentication and Authorization Concepts - 0:20
    • Authentication - 4:42
    • The Importance of Identity - 7:43
    • Additional Password Options - 0:54
    • Demo - Enforcing Strong Passwords - 10:04
    • Biometric Authentication - 2:50
    • Biometric Considerations - 1:35
    • Beyond Single Factor - 1:38
    • Certificate Authentication - 3:01
    • Authorization - 7:42
    • Open Authorization - 1:07
    • XACML - 1:55
    • SPML - 1:06
    • Authorization Concepts - 4:02
    • Trust Models - 1:53
    • Topic B: Cryptographic Techniques - 0:26
    • Introduction to Cryptography - 1:19
    • Cryptographic Techniques - 0:51
    • Key Stretching - 0:58
    • Hashing - 3:14
    • Message Digest (MD) Algorithms - 1:36
    • Secure Hash Algorithm (SHA) - 1:30
    • Digital Signatures - 2:00
    • Message Authentication - 1:17
    • Code Signing - 0:45
    • Additional Concepts - 2:12
    • Protecting Data in Transit - 2:01
    • Protecting Data in Memory - 1:13
    • Protecting Data at Rest - 3:44
    • Symmetric Algorithms - 4:08
    • Asymmetric Algorithms - 3:00
    • Encryption Methods - 3:22
    • Topic C: Cryptographic Implementations - 0:27
    • Crypto Options - 2:08
    • Additional Crypto Options - 2:41
    • Cryptographic Applications - 1:05
    • Crypto Considerations - 1:27
    • Stream vs. Block Ciphers - 1:47
    • Block Cipher Modes - 0:25
    • Public Key Infrastructure - 5:41
    • Primary PKI Functions - 2:09
    • Additional PKI Concepts - 1:42
    • Chapter 03 Review - 1:05
    • Quiz 3
  • Chapter 04 - Implementing Security for Systems, Applications, and Storage
    • Chapter Introduction - 0:56
    • Topic A: Security for Host Devices - 0:25
    • Trusted OS - 2:14
    • Trusted OS Options - 3:11
    • Security Software - 6:06
    • Additional Host-Based Software Options - 2:23
    • Demo - Configuring a Host-Based Firewall - 7:42
    • Auditing - 2:08
    • Demo - Configuring Audit Policies - 8:14
    • Endpoint Detection Response - 1:00
    • Host Hardening - 4:00
    • Group Policy - 2:20
    • Demo - Configuring Group Policy Security - 4:44
    • Command Shell Restrictions - 2:17
    • Out-of-Band Management - 2:11
    • Dedicated Interfaces - 2:34
    • External I/O Restrictions - 1:54
    • Wireless Technologies - 5:03
    • Wi-Fi Components - 1:59
    • 802.11 Standards - 3:21
    • Wireless Security - 5:39
    • Securing Other Host Devices - 3:18
    • Boot Security - 2:06
    • Additional Boot Security Options - 4:30
    • Topic B: Mobile Device Security - 0:40
    • Enterprise Mobility Management - 1:18
    • MDM Concepts - 2:56
    • Management Options - 3:32
    • Context Aware Management - 3:57
    • Security and Privacy - 4:16
    • Physical Security Options - 1:27
    • Additional Mobile Device Concepts - 6:07
    • Authentication Options - 2:22
    • Mobile Devices - 4:46
    • Wearable Security Implications - 1:38
    • Topic C: Software Security Controls - 0:26
    • Application Security Design Considerations - 3:03
    • Application Issues - 6:30
    • Application Issues (cont...) - 8:18
    • Data Remnants - 1:41
    • Securing Applications - 2:34
    • Using JSON and REST - 1:39
    • Browser Extensions - 2:39
    • Application Vulnerabilities - 1:57
    • Chapter 04 Review - 1:06
    • Quiz 4
  • Chapter 05 - Implementing Security for Cloud and Virtualization Technologies
    • Chapter Introduction - 2:21
    • Topic A: Cloud and Virtualization Technology - 1:21
    • Cloud Computing and Virtualization - 5:48
    • Cloud Options - 10:37
    • Security Considerations - 4:35
    • Cloud Service Models - 7:39
    • Demo - Examining Cloud Service Models - 9:14
    • Security and Virtualization - 5:46
    • Cloud-Augmented Security Services - 7:25
    • Security as a Service - 1:54
    • Virtualization Vulnerabilities - 3:40
    • Topic B: Securing Remote Access and Collaboration - 0:37
    • Remote Access - 1:09
    • Dial-Up Access - 3:09
    • Virtual Private Networks - 1:49
    • Remote Access Purposes - 3:05
    • Security Considerations - 2:08
    • Unified Collaboration Tools - 1:08
    • Web Conferencing - 4:43
    • Video Conferencing - 3:06
    • Storage and Document Collaboration - 3:12
    • Unified Communication - 1:44
    • Instant Messaging - 3:01
    • Presence - 3:13
    • E-Mail - 11:55
    • Chapter 05 Review - 1:04
    • Quiz 5
  • Chapter 06 - Utilizing Security Assessments and Incident Response
    • Chapter Introduction - 1:09
    • Topic A: Security Assessments - 0:20
    • Importance of Security Assessments - 0:40
    • Malware Sandboxing - 2:29
    • Memory Dumping - 1:36
    • Runtime Debugging - 1:25
    • Reconnaissance - 1:19
    • Fingerprinting - 2:29
    • Code Review - 2:47
    • Social Engineering - 12:47
    • Public Information - 11:15
    • Demo - Accessing Public Information - 6:36
    • Penetration Test - 5:41
    • Vulnerability Assessment - 3:34
    • Assessment Styles - 4:30
    • Topic B: Security Assessment Tools - 0:34
    • Network Tool Types - 4:39
    • Security Content Automation Protocol (SCAP) - 2:03
    • Common Vulnerability Scoring System (CVSS) - 3:16
    • Fuzzing - 0:50
    • Exploit Kits - 1:06
    • Host Tools - 7:25
    • Additional Host Tools - 3:40
    • Physical Security Tools - 3:23
    • Topic C: Incident Response and Recovery - 1:02
    • E-discovery - 5:37
    • Data Breach - 1:23
    • Incident Response Process - 4:30
    • Chapter 06 Review - 0:56
    • Quiz 6
    • Course Closure - 2:36

View Full Curriculum


Access
Lifetime
Content
16.0 hours
Lessons
583

CompTIA Security+ SY0-501

Gain Basic Knowledge Needed to Plan, Implement & Maintain Information Security in a Vendor-Neutral Format

By Integrity Training | in Online Courses

The CompTIA Security+ is the premier vendor-neutral security certification. This preparatory course for the CompTIA Security+ certification exam assures that the students completely learn and understand the exam topics of the latest SY0-501 exam version. The students will be able to demonstrate their knowledge of security concepts, tools, and procedures. It also confirms their ability to react to security incidents and validates their skills in anticipating security risks and guarding against them.

4.2/5 average rating: ★ ★ ★ ★

  • Access 583 lectures & 16 hours of content 24/7
  • Plan, implement & maintain information security in a vendor-neutral format
  • Understand different topics such as risk management, hots & network security, authentication and access control systems, & more
  • Know more each topic through theoretical & scenario-based learning examples
  • Completely learn & understand exam topics of the latest SY0-501 exam version
  • Demonstrate knowledge of security concepts, tools & procedures
Integrity Training, Certification Trainers for Over 20 Years
4.3/5 Instructor Rating: ★ ★ ★ ★

Integrity Training provides the corporate, government, and education sectors with proven on-demand training for employees. With 20 years in the business, over 600 online training courses, and over 1.2 million students taking the courses, Integrity Training is a name you can trust in workforce training.

Important Details

  • Length of time users can access this course: lifetime
  • Access options: desktop & mobile
  • Redemption deadline: redeem your code within 30 days of purchase
  • Experience level required: all levels
  • Have questions on how digital purchases work? Learn more here

Requirements

  • Any device with basic specifications

Course Outline

  • Course Introduction
    • Course Introduction - 1:55
    • Courseware Information - 0:15
    • Instructor Introduction - 1:33
  • Chapter 01 - Identifying Security Fundamentals
    • Identifying Security Fundamentals - 1:11
    • Topic A: Identify Information Security Concepts - 0:53
    • Information Security - 1:18
    • Goals of Information Security - 1:56
    • Risk - 3:08
    • Vulnerabilities - 2:06
    • Threats - 0:58
    • Attacks - 1:16
    • Controls - 1:31
    • Types of Controls - 1:27
    • The Security Management Process - 1:45
    • Demo - Identifying Information Security Basics - 2:41
    • Topic B: Identify Basic Security Controls - 0:37
    • The CIA Triad - 0:28
    • The CIA Triad (cont.) - 5:09
    • Non-repudiation - 0:43
    • Identification - 1:05
    • Authentication - 0:47
    • Authentication Factors - 4:01
    • Authorization - 0:58
    • Access Control - 0:46
    • Accounting and Auditing - 1:02
    • Principle of Least Privilege - 1:58
    • Privilege Management - 3:02
    • Demo - Identifying Basic Security Controls - 1:58
    • Topic C: Identify Basic Authentication and Authorization Concepts - 0:49
    • Passwords - 2:04
    • Tokens - 1:27
    • Biometrics - 1:53
    • Geolocation - 1:26
    • Keystroke Authentication - 1:18
    • Multi-factor Authentication - 1:36
    • Mutual Authentication - 0:36
    • Demo - Identifying Basic Authentication and Authorization Concepts - 2:31
    • Topic D: Identify Basic Cryptography Concepts - 0:37
    • Cryptography - 1:34
    • Encryption and Decryption - 1:56
    • Encryption and Decryption (cont.) - 0:53
    • Encryption and Security Goals - 1:34
    • Ciphers - 1:20
    • A Key - 2:11
    • Symmetric Encryption - 0:55
    • Asymmetric Encryption - 1:45
    • Asymmetric Encryption ( cont.) - 1:56
    • Hashing - 1:54
    • Steganography - 1:46
    • Demo - Identifying Basic Cryptography Concepts - 4:43
    • Chapter 01 Review - 0:55
    • Review Questions
  • Chapter 02 - Analyzing Risk
    • Analyzing Risk - 1:06
    • Topic A: Analyze Organizational Risk - 0:37
    • Risk Management - 1:10
    • Components of Risk Analysis - 2:17
    • Phases of Risk Analysis - 2:41
    • Categories of Threat Types - 1:38
    • Risk Analysis Methods - 1:36
    • Risk Calculation - 3:10
    • Risk Response Techniques - 2:08
    • Risk Mitigation and Control Types - 2:20
    • Change Management - 2:00
    • Change Management (cont.) - 1:15
    • Guidelines for Analyzing Risk - 1:15
    • Demo - Analyzing Risks to the Organization - 3:03
    • Topic B: Analyze the Business Impact of Risk - 0:42
    • BIA - 1:14
    • Impact Scenarios - 1:17
    • Impact Scenarios (cont.1) - 0:40
    • Impact Scenarios (cont.2) - 1:43
    • Privacy Assessments - 2:06
    • Critical Systems and Functions - 1:04
    • Maximum Tolerable Downtime - 0:54
    • Recovery Point Objective - 1:01
    • Recovery Time Objective - 0:38
    • Mean Time to Failure - 0:34
    • Mean Time to Repair - 0:39
    • Mean Time Between Failures - 1:03
    • Guidelines for Performing a Business Impact Analysis - 0:55
    • Demo - Performing a Business Impact Analysis - 3:49
    • Chapter 02 Review - 0:51
    • Review Questions
  • Chapter 03 - Identifying Security Threats
    • Identifying Security Threats - 1:44
    • Topic A: Identify Types of Attackers - 0:29
    • Hackers and Attackers - 2:42
    • Hackers and Attackers (cont.) - 2:00
    • Threat Actors - 2:12
    • Threat actors (cont.) - 0:21
    • Threat Actor Attributes - 2:35
    • Threat Actor Attributes (cont.) - 1:18
    • Open-Source Intelligence - 1:35
    • Demo - Identifying Types of Attackers - 2:46
    • Topic B: Identify Social Engineering Attacks - 1:27
    • Social Engineering - 1:46
    • Social Engineering (cont.) - 1:56
    • Effectiveness - 5:49
    • Impersonation - 1:47
    • Phishing and Related Attacks - 4:12
    • Phishing and Related Attacks (cont.) - 2:40
    • Hoaxes - 1:14
    • Physical Exploits - 1:57
    • Watering Hole Attacks - 0:58
    • Demo - Identifying Social Engineering Attacks - 2:09
    • Topic C: Identify Malware - 0:30
    • Malicious Code - 0:53
    • Malicious Code (cont.) - 1:07
    • Viruses - 1:58
    • Worms - 0:59
    • Adware - 0:42
    • Spyware - 1:08
    • Trojan Horses - 1:02
    • Keyloggers - 1:22
    • Remote Access Trojans - 0:37
    • Logic Bombs - 1:20
    • Botnets - 2:28
    • Bonets (cont.) - 0:19
    • Ransomware - 3:19
    • Ransomware (cont.) - 0:56
    • Advance Persistent Threats - 1:04
    • Demo - Identifying Types of Malware - 2:44
    • Topic D: Identify Software-Based Threats - 0:37
    • Software Attacks - 0:45
    • Password Attacks - 0:52
    • Types of Password Attacks - 2:20
    • Types of Password Attacks (cont.) - 2:13
    • Cryptographic Attacks - 0:48
    • Types of Cryptographic Attacks - 2:36
    • Types of Cryptographic Attacks (cont.) - 1:21
    • Backdoor Attacks - 1:15
    • Backdoor Attaxks (cont.) - 0:18
    • Application Attacks - 1:08
    • Application Attacks (cont.) - 0:28
    • Types of Application Attacks - 4:29
    • Driver Manipulation - 1:23
    • Privilege Escalation - 1:21
    • Privilege Escalation (cont.) - 0:20
    • Demo - Identifying Password Attacks - 7:51
    • Topic E: Identify Network-Based Threats - 1:04
    • TCP/IP Basics - 3:06
    • TCP/IP (cont.) - 3:50
    • Spoofing Attacks - 0:52
    • IP and MAC Address Spoofing - 1:10
    • IP and MAC Address Spoofing (cont.) - 0:47
    • ARP Poisoning - 2:33
    • DNS Poisoning - 1:57
    • Port Scanning Attacks - 2:09
    • Port Scanning Attacks (cont.) - 0:13
    • Scan Types - 1:13
    • Scan Types (cont.) - 0:54
    • Eavesdropping Attacks - 1:21
    • Man-in-the-Middle Attacks - 0:44
    • Man-in-the-Middle Attacks (cont.) - 0:37
    • Man-in-the-Browser Attacks - 1:00
    • Replay Attacks - 0:37
    • Replay Attacks (cont.) - 0:34
    • DoS Attacks - 1:39
    • DDoS Attacks - 1:22
    • Hijacking Attacks - 1:24
    • Hijacking Attacks (cont.) - 1:29
    • Amplification Attacks - 0:35
    • Amplification Attacks (cont.) - 1:57
    • Pass the Hash Attacks - 1:08
    • Demo - Identifying Threats to DNS - 4:01
    • Demo - Identifying Port Scanning Threats - 7:26
    • Topic F: Identify Wireless Threats - 0:40
    • Rogue Access Points - 0:51
    • Evil Twins - 1:03
    • Jamming - 0:36
    • Bluejacking - 1:27
    • Bluesnarfing - 0:57
    • Near Field Communication Attacks - 1:03
    • RFID System Attacks - 0:58
    • War Driving, War Walking, and War Chalking - 1:11
    • Packet Sniffing - 0:44
    • IV Attacks - 1:16
    • Wireless Replay Attacks - 0:23
    • WEP and WPA Attacks - 2:38
    • WPS Attacks - 1:04
    • Wireless Disassociation - 0:57
    • Demo - Identifying Wireless Threats - 3:02
    • Topic G: Identify Physical Threats - 0:55
    • Physical Threats and Vulnerabilities - 0:50
    • Hardware Attacks - 0:44
    • Environmental Threats and Vulnerabilities - 2:01
    • Environmental Threats and Vulnerabilities (cont.) - 1:06
    • Demo - Identifying Physical Threats - 1:58
    • Chapter 03 Review - 1:16
    • Review Questions
  • Chapter 04 - Conducting Security Assessments
    • Conducting Security Assessments - 0:53
    • Topic A: Identify Vulnerabilities - 0:26
    • Host Vulnerabilities - 3:17
    • Software Vulnerabilities - 4:04
    • Encryption Vulnerabilities - 1:59
    • Network Architecture Vulnerabilities - 2:05
    • Account Vulnerabilities - 1:23
    • Operations Vulnerabilities - 3:06
    • Demo - Identifying Vulnerabilities - 2:57
    • Topic B: Assess Vulnerabilities - 0:24
    • Security Assessment - 1:56
    • Security Assessment Techniques - 2:43
    • Vulnerability Assessment Tools - 3:16
    • Types of Vulnerability Scans - 1:45
    • False Positives - 2:25
    • Guidelines for Assessing Vulnerabilities - 2:27
    • Demo - Capturing Network Data with Wireshark - 8:25
    • Demo - Scanning for General Vulnerabilities - 5:20
    • Topic C: Implement Penetration Testing - 0:28
    • Penetration Testing - 1:07
    • Penetration Testing Techniques - 3:05
    • Box Testing Methods - 1:28
    • Penetration Testing Tools - 0:58
    • Guidelines for Implementing Penetration Testing - 0:59
    • Demo - Implementing Penetration Testing - 4:50
    • Chapter 04 Review - 0:55
    • Review Questions
  • Chapter 05 - Implementing Host and Software Security
    • Implementing Host and Software Security - 1:04
    • Topic A: Implement Host Security - 0:23
    • Hardening - 1:58
    • Operating System Security - 1:41
    • Operating System Hardening Techniques - 1:34
    • Trusted Computing Base - 1:37
    • Hardware and Firmware Security - 2:01
    • Hardware and Firmware Security (cont.) - 1:18
    • Security Baselines - 0:57
    • Software Updates - 2:44
    • Application Blacklisting and Whitelisting - 1:32
    • Logging - 1:07
    • Auditing - 1:57
    • Anti-malware Software - 1:49
    • Types of Anti-malware Software - 2:42
    • Hardware Peripheral Security - 3:30
    • Embedded Systems - 1:29
    • Security Implications for Embedded Systems - 2:04
    • Security Implications for Embedded System (cont.) - 2:10
    • Guidelines for Securing Hosts - 1:47
    • Demo - Implementing Auditing - 4:41
    • Demo - Hardening a Server - 6:01
    • Topic B: Implement Cloud and Virtualization Security - 0:28
    • Virtualization - 2:50
    • Hypervisors - 1:35
    • Hypervisors (cont.) - 1:42
    • Virtual Desktop Infrastructure - 0:56
    • Virtualization Security - 2:42
    • Cloud Computing - 2:46
    • Cloud Deployment Models - 3:56
    • Cloud Service Types - 3:41
    • Guidelines for Securing Virtualized and Cloud-Based Resources - 1:22
    • Demo - Securing Virtual Machine Networking - 2:14
    • Topic C: Implement Mobile Device Security - 0:38
    • Mobile Device Connection Methods - 2:15
    • Mobile Device Connection Methods (cont.) - 1:52
    • Mobile Device Management - 0:42
    • Mobile Device Security Controls - 2:42
    • Mobile Device Security Controls (cont.) - 2:18
    • Mobile Device Monitoring and Enforcement - 3:08
    • Mobile Device Monitoring and Enforcement (cont.) - 2:44
    • Mobile Deployment Models - 3:10
    • BYOD Security Controls - 2:46
    • Guidelines for Implementing Mobile Device Security - 1:39
    • Demo - Implementing Mobile Device Security - 2:10
    • Topic D: Incorporate Security in the Software Development Lifecycle - 0:32
    • Software Development Lifecycle - 0:55
    • Software Development Models - 2:48
    • DevOps - 1:36
    • Versioning - 1:16
    • Secure Coding Techniques - 3:01
    • Secure Coding Techniques (cont.) - 1:42
    • Code Testing Methods - 1:35
    • Guidelines for Incorporating Security in the Software Development Lifecycle - 0:57
    • Demo - Performing Static Code Analysis - 4:30
    • Chapter 05 Review - 0:35
    • Review Questions
  • Chapter 06 - Implementing Network Security
    • Mobile Device Monitoring and Enforcement - 0:47
    • Topic A: Configure Network Security Technologies - 0:40
    • Network Components - 1:24
    • Network Devices - 0:29
    • Routers - 2:00
    • Switches - 2:42
    • Proxies - 2:28
    • Firewalls - 3:04
    • Load Balancer - 2:29
    • Network Scanners and Analysis Tools - 1:05
    • Intrusion Detection Systems - 0:45
    • Network IDS - 1:47
    • Intrusion Prevention Systems - 1:19
    • Network IPS - 0:47
    • Types of Network Monitoring Systems - 1:45
    • Security Information and Event Management - 1:08
    • Data Loss/Leak Prevention - 1:34
    • Virtual Private Networks - 1:14
    • VPN Concentrators - 1:06
    • Security Gateways - 1:16
    • Unified Threat Management - 1:18
    • Guidelines for Configuring Network Security Technologies - 1:56
    • Demo - Configuring a Network IDS - 7:53
    • Topic B: Secure Network Design Elements - 0:20
    • Network Access Control - 1:57
    • Demilitarized Zones - 0:59
    • Network Isolation - 1:46
    • Network Isolation (cont.) - 0:18
    • Virtual Local Area Networks - 1:12
    • Virtual Local Area Networks (cont.) - 0:28
    • Network Security Device Placement - 2:29
    • Network Address Translation - 1:09
    • Software-Defined Networking - 0:48
    • Guidelines for Securing Network Design Elements - 1:20
    • Demo - Securing Network Design Elements - 3:32
    • Topic C: Implement Secure Networking Protocols and Services - 0:26
    • The Open Systems Interconnection Model - 3:45
    • OSI Model and Security - 0:45
    • Internet Protocol Suite - 4:01
    • Domain Name System - 2:34
    • Hypertext Transfer Protocol - 0:55
    • Secure Sockets Layer/Transport Layer Security - 1:51
    • Secure Sockets Layer/Transport Layer Security (cont.) - 1:09
    • HTTP Secure - 0:28
    • Secure Shell - 0:58
    • Simple Network Management Protocol - 1:10
    • Real-Time Transport Protocol - 1:13
    • Internet Control Message Protocol - 1:23
    • Internet Protocol Security - 3:27
    • Network Basic Input/Output System - 1:05
    • File Transfer Protocols - 1:57
    • Email Protocols - 2:48
    • Additional Networking Protocols and Services - 1:36
    • Ports and Port Ranges - 1:37
    • Demo - Installing an Internet Information Services Web Server with Basic Security - 10:36
    • Demo - Securing Network Traffic Using IPSec - 6:00
    • Topic D: Secure Wireless Traffic - 0:18
    • Wireless Networks - 1:32
    • Wireless Antenna Types - 2:32
    • 802.11 Protocols - 3:04
    • Wireless Cryptographic Protocols - 2:17
    • Wireless Authentication Protocols - 2:34
    • VPNs and Open Wireless - 1:16
    • Wireless Client Authentication Methods - 1:46
    • Wireless Access Point Security - 2:05
    • Captive Portals - 0:42
    • Site Surveys - 0:52
    • Guidelines for Securing Wireless Traffic - 1:29
    • Demo - Securing Wireless Traffic - 6:12
    • Chapter 06 Review - 0:33
    • Review Questions
  • Chapter 07 - Managing Identity and Access
    • Managing Identify and Access - 0:58
    • Topic A: Implement Identity and Access Management - 0:26
    • Identity and Access Management - 2:10
    • Access Control Models - 4:47
    • Physical Access Control Devices - 1:08
    • Biometric Devices - 3:26
    • Certificate-Based Authentication - 1:45
    • File System and Database Access - 2:11
    • Guidelines for Implementing IAM - 1:29
    • Demo - Implementing DAC for a File Share - 6:17
    • Topic B: Configure Directory Services - 0:19
    • Directory Services - 1:16
    • Directory Services (cont.) - 0:44
    • Lightweight Directory Access Protocol - 1:48
    • Secure LDAP - 0:44
    • Common Directory Services - 2:17
    • Demo - Backing Up Active Directory - 8:15
    • Topic C: Configure Access Services - 0:24
    • Remote Access Methods - 1:19
    • Tunneling - 1:21
    • Remote Access Protocols - 2:09
    • HMAC-Based One-Time Password - 1:26
    • Time-Based OTP - 0:42
    • Password Authentication Protocol - 0:43
    • Challenge-Handshake Authentication Protocol - 2:34
    • NT LAN Manager - 1:19
    • Authentication, Authorization, and Accounting - 0:51
    • Remote Authentication Dial-In User Service - 0:55
    • Remote Authentication Dial-In User Service (cont.) - 1:00
    • Terminal Access Controller Access-Control System - 1:04
    • Kerberos - 1:19
    • Kerberos (Cont.) - 2:54
    • Demo - Configuring a Remote Access Server - 6:06
    • Demo - Setting Up Remote Access Authentication - 4:17
    • Topic D: Manage Accounts - 0:20
    • Account Management - 0:44
    • Account Privileges - 2:07
    • Account Types - 2:42
    • Account Policy - 1:55
    • Password Policy - 3:06
    • Multiple Accounts - 1:15
    • Shared Accounts - 1:43
    • Account Management Security Controls - 3:29
    • Credential Management - 1:05
    • Group Policy - 1:03
    • Identity Federation - 2:40
    • Identity Federation Methods - 2:07
    • Guidelines for Managing Accounts - 1:14
    • Demo - Managing Accounts - 5:13
    • Chapter 07 Review - 0:30
    • Review Questions
  • Chapter 08 - Implementing Cryptography
    • Implementing Crytography - 0:52
    • Topic A: Identify Advanced Cryptography Concepts - 0:21
    • Cryptography Elements - 3:01
    • Hashing Concepts - 1:33
    • Data States - 1:51
    • Key Exchange - 1:30
    • Key Exchange (cont.) - 0:17
    • Digital Signatures - 0:49
    • Digital Signatures (cont.) - 0:40
    • Cipher Suites - 1:35
    • Session Keys - 1:16
    • Key Stretching - 0:43
    • Special Considerations for Cryptography - 2:20
    • Demo - Identifying Advanced Cryptographic Concepts - 2:55
    • Topic B: Select Cryptographic Algorithms - 0:14
    • Types of Ciphers - 1:43
    • Types of Hashing Algorithms - 1:36
    • Types of Symmetric Encryption Algorithms - 2:25
    • Types of Asymmetric Encryption Techniques - 2:09
    • Types of Key Stretching Algorithms - 0:54
    • Substitution Ciphers - 1:14
    • Exclusive Or - 1:24
    • Cryptographic Modules - 1:14
    • Demo - Selecting Cryptographic Algorithms - 2:22
    • Topic C: Configure a Public Key Infrastructure - 0:32
    • Public Key Infrastructure - 0:59
    • PKI Components - 2:54
    • CA Hierarchies - 2:39
    • The Root CA - 0:39
    • Subordinate CAs - 0:44
    • Offline Root CAs - 0:43
    • Types of Certificates - 2:23
    • Types of Certificates (cont.) - 2:41
    • X.509 - 0:56
    • Certificate File Formats - 2:00
    • CA Hierarchy Design Options - 2:08
    • Demo - Installing a CA - 5:30
    • Demo - Securing a Windows Server 2016 CA - 7:39
    • Topic D: Enroll Certificates - 0:26
    • The Certificate Enrollment Process - 1:23
    • The Certificate Lifecycle - 1:22
    • Certificate Lifecycle Management - 1:46
    • The SSL/TLS Connection Process - 1:02
    • Demo - Enrolling Certificates - 4:32
    • Demo - Securing Network Traffic with Certificates - 2:26
    • Topic E: Back Up and Restore Certificates and Private Keys - 0:28
    • Private Key Protection Methods - 1:12
    • Key Escrow - 2:20
    • Private Key Restoration Methods - 2:01
    • Private Key Replacement - 0:38
    • Demo - Backing Up a Certificate and Private Key - 3:28
    • Demo - Restoring a Certificate and Private Key - 1:16
    • Topic F: Revoke Certificates - 0:17
    • Certificate Revocation - 1:04
    • Certificate Revocation List - 1:40
    • Certificate Revocation List (cont.) - 0:22
    • Online Certificate Status Protocol - 1:38
    • Demo - Revoking Certificates - 2:36
    • Chapter 08 Review - 1:03
    • Review Questions
  • Chapter 09 - Implementing Operational Security
    • Implementing Operational Security - 0:41
    • Topic A: Evaluate Security Frameworks and Guidelines - 0:21
    • Security Frameworks - 1:27
    • Security Framework Examples - 1:37
    • Security Configuration Guides - 1:37
    • Compliance - 1:30
    • Layered Security - 1:07
    • Defense in Depth - 0:46
    • Demo - Evaluating Security Frameworks and Guidelines - 2:53
    • Topic B: Incorporate Documentation in Operational Security - 0:19
    • Security Policies - 1:11
    • Security Policies (cont.) - 0:43
    • Common Security Policy Types - 2:57
    • Personnel Management - 0:51
    • Separation of Duties - 0:53
    • Job Rotation - 1:17
    • Mandatory Vacation - 0:54
    • Additional Personnel Management Tasks - 1:35
    • Training and Awareness - 2:01
    • Business Agreements - 1:43
    • Guidelines for Incorporating Documentation in Operational Security - 1:08
    • Demo - Incorporating Documentation in Operational Security - 3:48
    • Topic C: Implement Security Strategies - 0:26
    • Security Automation - 1:42
    • Scalability - 1:03
    • Elasticity - 1:17
    • Redundancy - 1:15
    • Fault Tolerance - 0:50
    • Redundant Array of Independent Disks - 1:33
    • Non-persistence - 1:27
    • High Availability - 1:08
    • Deployment Environments - 1:44
    • Guidelines for Implementing Security Strategies - 1:15
    • Demo - Implementing Virtual Machine Snapshots - 2:37
    • Topic D: Manage Data Security Processes - 0:24
    • Data Security - 0:53
    • Data Security Vulnerabilities - 0:51
    • Data Storage Methods - 1:14
    • Data Encryption Methods - 1:04
    • Data Sensitivity - 1:32
    • Data Management Roles - 1:28
    • Data Retention - 1:00
    • Data Disposal - 2:18
    • Guidelines for Managing Data Security - 0:54
    • Demo - Destroying Data Securely - 6:36
    • Demo - Encrypting a Storage Device - 3:48
    • Topic E: Implement Physical Controls - 0:26
    • Physical Security Controls - 1:20
    • Physical Security Control Types - 1:56
    • Physical Security Controls Types (cont. Part 1) - 1:38
    • Physical Security Controls Types (cont. Part 2) - 1:23
    • Physical Security Controls Types (cont. Part 3) - 0:46
    • Environmental Exposures - 0:36
    • Environmental Controls - 1:19
    • Environmental Controls (cont.) - 1:14
    • Environmental Monitoring - 0:37
    • Safety - 0:45
    • Guidelines for Implementing Physical Controls - 0:53
    • Demo - Implementing Physical Controls - 1:41
    • Chapter 09 Review - 0:31
    • Review Questions
  • Chapter 10 - Addressing Security Issues
    • Addressing Security Issues - 0:59
    • Topic A: Troubleshoot Common Security Issues - 0:24
    • Access Control Issues - 1:54
    • Encryption Issues - 1:21
    • Data Exfiltration - 1:08
    • Anomalies in Event Logs - 1:21
    • Security Configuration Issues - 2:11
    • Baseline Deviations - 1:14
    • Software Issues - 1:10
    • Personnel Issues - 1:53
    • Asset Management Issues - 1:06
    • Demo - Identifying Event Log Anomalies - 3:41
    • Topic B: Respond to Security Incidents - 0:14
    • Incident Response - 0:51
    • Incident Preparation - 1:00
    • Incident Detection and Analysis - 0:57
    • Incident Containment - 0:49
    • Incident Eradication - 0:32
    • Incident Recovery - 1:01
    • Lessons Learned - 0:43
    • Incident Response Plans - 1:31
    • First Responders - 0:31
    • An Incident Report - 0:42
    • Guidelines for Responding to Security Incidents - 0:33
    • Demo - Responding to a Security Incident - 2:39
    • Topic C: Investigate Security Incidents - 0:17
    • Computer Forensics - 0:42
    • The Basic Forensic Process - 1:34
    • Preservation of Forensic Data - 1:34
    • Basic Forensic Response Procedures - 1:29
    • Basic Forensic Response Procedure (cont.) - 1:03
    • Order of Volatility - 0:34
    • Chain of Custody - 0:24
    • Guidelines for Investigating Security Incidents - 0:53
    • Demo - Implementing Forensic Procedures - 5:39
    • Chapter 10 Review - 0:33
    • Review Questions
  • Chapter 11 - Ensuring Business Continuity
    • Ensuring Business Continuity - 0:43
    • Topic A: Select Business Continuity and Disaster Recovery Processes - 0:22
    • Business Continuity and Disaster Recovery - 1:55
    • The Disaster Recovery Process - 1:50
    • Recovery Team - 0:40
    • Order of Restoration - 1:46
    • Recovery Sites - 1:13
    • Secure Recovery - 0:34
    • Backup Types (Full) - 0:44
    • Backup Types (Differential vs. Incremental) - 1:37
    • Secure Backups - 1:21
    • Geographic Considerations - 1:27
    • Guidelines for Selecting Business Continuity and Disaster Recovery Processes - 1:28
    • Demo - Selecting Business Continuity and Disaster Recovery Processes - 2:14
    • Topic B: Develop a Business Continuity Plan - 0:16
    • Business Continuity Plans - 1:15
    • Business Continuity Plans (cont.) - 0:17
    • Disaster Recovery Plans - 1:00
    • Disaster Recovery Plans (cont.) - 0:25
    • IT Contingency Plans - 0:50
    • Succession Plans - 0:23
    • Failover - 1:08
    • Alternate Business Practices - 0:42
    • Testing Exercises - 1:05
    • After-Action Reports - 1:06
    • Guidelines for Developing a BCP - 0:58
    • Demo - Developing a BCP - 1:58
    • Chapter 11 Review - 0:26
    • Review Questions
    • Course Closure - 2:24

View Full Curriculum


Access
Lifetime
Content
18.0 hours
Lessons
235

CompTIA Security+ (SY0-601) Complete Course

CompTIA Security+ Topics & Sample Questions Required for the CompTIA Security SY601 Exam

By Oak Academy | in Online Courses

Every internet-connected person is affected by issues about cybersecurity. As a result, cybersecurity professionals are increasingly in demand. That’s why Udemy offers top-rated CompTIA Security+ exam prep courses to help you prepare for the job market. This course walks you through all the things you need to pass the CompTIA Security + (SY601) exam, step by step. You can pass the CompTIA Security + exam by studying the topics covered throughout the course.

4.4/5 average rating: ★ ★ ★ ★

  • Access 235 lectures & 18 hours of content 24/7
  • Assess the cybersecurity posture of an enterprise environment
  • Recommend & implement appropriate cybersecurity solutions
  • Monitor & secure hybrid environments
  • Operate with an awareness of applicable laws & policies
  • Identify, analyze & respond to cybersecurity events and incidents
  • Utilize appropriate data sources to support an investigation
  • Use mitigation techniques or controls to secure an environment
  • Compare various types of controls
Oak Academy | Long Live Tech Knowledge
4.6/5 Instructor Rating: ★ ★ ★ ★

Oak Academy is a group of tech experts who have been in the sector for years and years. Deeply rooted in the tech world, they know that the tech industry's biggest problem is the "tech skills gap" and their online course are their solution. They specialize in critical areas like cybersecurity, coding, IT, game development, app monetization, and mobile. Thanks to their practical alignment, they are able to constantly translate industry insights into the most in-demand and up-to-date courses.

Important Details

  • Length of time users can access this course: lifetime
  • Access options: desktop & mobile
  • Redemption deadline: redeem your code within 30 days of purchase
  • Experience level required: all levels
  • Have questions on how digital purchases work? Learn more here

Requirements

  • Basic familiarity with PCs and networks

Course Outline

  • Introduction
    • 1 - Introduction to comptia security + - 11:34
  • Basic Security Concepts
    • 2 - What is security? - 2:22
    • 3 - Privacy-Integrity-Availability - 3:15
    • 4 - Encryption and Access Control - 2:54
    • 5 - 3 A Rule (Authentication, Authorization and Accounting) - 3:52
    • 6 - Threat - 3:45
    • 7 - What is a Hacker? - 6:27
    • 8 - What is Attack? What are the Stages? - 3:19
    • 9 - Single Point Of Failure (SPOF) - 3:13
    • 10 - Introducing Basic Risk Concepts - 3:22
  • Identity Management
    • 11 - What is Identity Management? - 2:14
    • 12 - KERBEROS & NTLM&LDAP - 7:31
    • 13 - Single Sign-On (SSO) - 11:02
    • 14 - Smart Cards - 2:58
    • 15 - Tokens or Key Fobs - 5:20
    • 16 - Biometric Methods - 7:36
    • 17 - Dual-Factor and Multifactor Authentication - 1:38
    • 18 - PAP / CHAP / MS-CHAP - 2:46
    • 19 - RADIUS - 6:26
  • Summary-1
    • 20 - Summary-1 - 3:26
  • Users
    • 21 - Create a User - 3:03
    • 22 - Managing Accounts - 1 - 11:44
    • 23 - Managing Accounts - 2 - 9:20
    • 24 - Passwords - 9:18
    • 25 - Password Policy - 9:02
  • Comparing Access Control Models
    • 26 - Comparing Access Control Models - 2:19
    • 27 - Role-Based Access Control - 3:15
    • 28 - Establishing Access with Group-Based Privileges - 4:42
    • 29 - Rule Based and Discretionary Access Control - 5:39
    • 30 - Mandatory Access Control - 2:46
    • 31 - Establishing Access - 6:07
  • Virtualization
    • 32 - What is Virtualization? - 3:46
    • 33 - Virtualization Technologies - 2:55
    • 34 - Benefits of Virtualization - 5:00
    • 35 - Security Issues of Virtualization - 3:50
  • Network Technologies
    • 36 - Basic Network Concepts - 15:38
    • 37 - Domain Name Services (DNS) - 9:47
    • 38 - What is the port? How does it work? - 5:10
    • 39 - What is the Network Address - 7:05
    • 40 - Combining the IP Address and the Port - 4:37
    • 41 - Switches - 5:03
    • 42 - Bridge - 3:07
    • 43 - Routers - 9:29
    • 44 - Understanding NAT and PAT - 2:37
    • 45 - Network Separation - 3:16
    • 46 - Proxy Servers - 7:13
    • 47 - Types of Using Network Technologies - 1 - 9:12
    • 48 - Types of Using Network Technologies - 2 - 8:26
  • Wireless Networks
    • 49 - Reviewing Basic Wireless Network Information - 6:29
    • 50 - Wireless Cryptographic Protocols - 7:38
    • 51 - Authentication Protocols for Wireless Networks - 6:24
  • Summary-2
    • 52 - Summary-2 - 3:02
  • Network Security Technologies
    • 53 - Firewalls - 9:28
    • 54 - Network Access Control - 9:27
    • 55 - Implementing a Secure Network - 5:15
  • Intrusion Detection Systems
    • 56 - Understanding IDSs and IPSs - 4:46
    • 57 - Detection Methods - 11:49
    • 58 - Honeypots - 4:42
  • Virtual Private Network(VPN) Technologies
    • 59 - Using VPNs for Remote Access - 3:54
    • 60 - VPN Tunnel Protocols - 6:18
    • 61 - Site-to-Site VPNs - 2:36
  • Security Threats
    • 62 - Understanding Threat Actors - 12:36
    • 63 - Viruses - 2:10
    • 64 - Logic Bombs - 3:21
    • 65 - Trojans - 5:30
    • 66 - Ransomware - 3:24
    • 67 - Spyware - 3:03
    • 68 - Bots and Botnets - 4:17
    • 69 - Unified Threat Management (UTM) - 5:55
  • Securing Wireless Networks
    • 70 - Disable SSID Broadcasting or Not - 1:26
    • 71 - Enable MAC Filtering - 1:53
  • Understanding Wireless Attacks
    • 72 - Disassociation Attacks - 1:58
    • 73 - WPS and WPS Attacks - 1:50
    • 74 - Rogue AP - 2:14
    • 75 - Evil Twin - 2:08
    • 76 - Jamming Attacks - 3:47
    • 77 - Bluetooth Attacks - 2:51
    • 78 - RFID Attacks - 2:40
    • 79 - Wireless Replay Attacks - 1:49
  • Summary-3
    • 80 - Summary-3 - 2:44
  • Network Attacks
    • 81 - Network Attacks - 3:39
    • 82 - SYN Flood Attack - 2:55
    • 83 - MAC Flood Attacks - 2:53
    • 84 - Man-in-the-Middle Attacks - 1:33
    • 85 - ARP Poisoning Attacks - 3:49
    • 86 - DNS Attacks - 6:17
  • Password Attacks
    • 87 - Brute Force Attacks - 3:32
    • 88 - Password Hashes - 4:53
    • 89 - Birthday Attacks - 4:50
    • 90 - Replay Attacks - 3:25
    • 91 - Hijacking and Related Attacks - 5:59
    • 92 - Driver Manipulation - 2:07
  • Zero-Day Attacks
    • 93 - Zero-Day Attacks - 4:19
  • Code Attacks
    • 94 - Code Reuse and SDKs - 4:31
    • 95 - Code Quality and Testing - 2:51
    • 96 - Development Life-Cycle Models - 3:42
    • 97 - Secure DevOps - 3:19
    • 98 - Version Control and Change Management - 2:17
    • 99 - Provisioning and Deprovisioning - 1:48
  • Web Server Attacks
    • 100 - Web Servers - 2:07
    • 101 - SQL Injection Attacks - 4:32
    • 102 - Protecting Against SQL Injection Attacks - 2:38
    • 103 - DLL Injection - 2:24
    • 104 - Cross-Site Scripting - 6:40
  • Social Engineering Attacks
    • 105 - Social Engineering - 4:09
    • 106 - Shoulder Surfing - 1:06
    • 107 - Tricking Users with Hoaxes - 1:18
    • 108 - Tailgating and Mantraps - 1:12
    • 109 - Dumpster Diving - 1:26
    • 110 - Watering Hole Attacks - 1:06
    • 111 - Spam - 2:04
    • 112 - Phishing - 6:24
    • 113 - Whaling - 2:45
    • 114 - Vishing - 3:08
    • 115 - Beware of Email from Friends - 2:00
    • 116 - Why Social Engineering Works - 9:31
  • Summary - 4
    • 117 - Summary-4 - 3:32
  • Memory Buffer Vulnerabilities
    • 118 - Memory Leak - 2:41
    • 119 - Buffer Overflow Attacks - 4:16
    • 120 - Pointer Dereference - 2:07
    • 121 - Compiled Versus Runtime Code - 1:20
    • 122 - Proper Input Validation - 4:07
    • 123 - Side Input Validation - 3:20
    • 124 - Avoiding Race Conditions - 2:13
    • 125 - Proper Error Handling - 2:14
    • 126 - Cryptographic Techniques - 1:43
  • Preventing Attacks
    • 127 - Protecting Systems from Malware - 2:05
    • 128 - Antivirus and Anti-Malware Software - 8:22
    • 129 - Advanced Malware Tools - 3:31
    • 130 - Educating Users - 1:53
    • 131 - Implementing Defense in Depth - 3:35
  • Server Security
    • 132 - Implementing Secure Systems - 4:11
    • 133 - Operating systems - 4:12
    • 134 - Secure Operating System Configurations - 6:33
    • 135 - Resiliency and Automation Strategies - 4:56
    • 136 - Change Management Policy - 7:09
    • 137 - Secure Staging and Deployment - 5:26
    • 138 - Peripherals - 4:10
    • 139 - EMI and EMP - 7:46
    • 140 - Hardware Security Module - 2:26
    • 141 - Cloud Deployment Models - 5:29
    • 142 - Cloud Services - 6:20
    • 143 - Security Responsibilities with Cloud Models - 1:52
  • Mobile Devices
    • 144 - Deploying Mobile Devices Securely - 2:14
    • 145 - Deployment Models - 8:35
    • 146 - Mobile Device Management - 9:26
    • 147 - Unauthorized Software - 5:03
    • 148 - Hardware Control - 2:42
    • 149 - Unauthorized Connections - 2:32
  • Exploring Embedded Systems
    • 150 - Exploring Embedded Systems - 7:06
    • 151 - Understanding Stuxnet - 2:13
    • 152 - Real-Time Operating Systems - 3:16
  • Summary-5
    • 153 - Summary-5 - 4:13
  • Data Security
    • 154 - Protecting Data - 11:24
    • 155 - Data Loss Prevention - 5:31
  • Database Security
    • 156 - Database Concepts - 2:47
    • 157 - Normalization - 5:26
    • 158 - SQL Queries - 1:56
    • 159 - Database Security - 0:57
  • Risk Management
    • 160 - Understanding Risk Management - 2:39
    • 161 - Risk Management - 2:45
    • 162 - Threats and Threat Assessments - 4:22
    • 163 - Vulnerabilities - 2:03
    • 164 - Risk Assessment - 13:06
    • 165 - Risk Registers - 5:51
  • Checking for Vulnerabilities
    • 166 - Checking for Vulnerabilities - 1:52
    • 167 - Password Crackers - 1:59
    • 168 - Network Scanners - 5:23
    • 169 - Wireless Scanners / Cracker - 3:17
    • 170 - Banner Grabbing - 0:47
    • 171 - Vulnerability Scanning - 11:23
  • Penetration Tests
    • 172 - Penetration Tests - 2:45
    • 173 - Passive & Active Reconnaissance - 2:02
    • 174 - Initial Exploitation - 3:45
    • 175 - White, Gray and Black Box Testing - 3:00
    • 176 - Intrusive and Non-Intrusive Testing - 1:22
    • 177 - Passive Versus Active Tools - 11:41
  • Physical Security Precautions
    • 178 - Comparing Physical Security Controls - 3:28
    • 179 - Comparing Door Lock Types - 5:33
    • 180 - Preventing Tailgating with Mantraps - 2:00
    • 181 - Increasing Physical Security with Guards - 8:20
    • 182 - Using Hardware Locks - 2:56
    • 183 - Asset Management - 2:33
    • 184 - Implementing Environmental Controls - 14:02
  • Summary-6
    • 185 - Summary-6 - 1:59
  • Single Point of Failure
    • 186 - Single Point of Failure - 1:46
    • 187 - Disk Redundancies - 4:24
    • 188 - Server Redundancy and High Availability - 9:11
    • 189 - Backup - 15:18
  • Business Continuity Plans
    • 190 - Comparing Business Continuity Elements - 6:09
    • 191 - Impact - 3:54
    • 192 - Recovery Time Objective - 4:55
    • 193 - Recovery Sites - 5:53
    • 194 - Disaster Recovery - 8:11
  • Examination of Logs
    • 195 - Monitoring Logs for Event Anomalies - 8:43
    • 196 - OtherLogs-SIEM - 7:12
    • 197 - Continuous Monitoring - 6:08
  • Controls
    • 198 - Understanding Control Types - 7:12
    • 199 - Control Goals - 10:53
  • Cryptography and PKI
    • 200 - Introducing Cryptography Concepts - 3:08
    • 201 - Hashing - 4:43
    • 202 - MD5 - 0:54
    • 203 - SHA - 2:55
    • 204 - HMAC - 2:49
    • 205 - Hashing_Files - 2:56
    • 206 - DigitalSignaturesCertificatesandNo_Denial - 2:52
    • 207 - Hashing Messages - 4:35
    • 208 - Providing Confidentiality with Encryption - 8:16
    • 209 - Block Versus Stream Ciphers - 4:09
    • 210 - Symmetric Encryption - 1:55
    • 211 - Symmetric Encryption Methods - 6:19
    • 212 - Asymmetric Encryption - 1:56
    • 213 - Certificates - 3:58
    • 214 - Steganography And Obfuscation - 2:40
    • 215 - Using Cryptographic Protocols - 1:49
    • 216 - Cipher Suites - 3:38
    • 217 - Exploring PKI Components - 8:04
    • 218 - Recovery Agent - 1:08
    • 219 - Comparing Certificate Types - 4:37
    • 220 - Certificate Formats - 3:10
  • Protecting Email
    • 221 - Protecting Email - 1:51
    • 222 - Encrypting Email - 3:39
    • 223 - HTTPS Transport Encryption - 5:08
  • Risk Mitigation Methods
    • 224 - Exploring Security Policies - 1:14
    • 225 - Personnel Management Policies - 10:41
    • 226 - Background Check - 2:50
    • 227 - NDA - 4:40
    • 228 - Policy Violations and Adverse Actions - 1:37
    • 229 - Agreement Types - 3:02
    • 230 - PII and PHI - 5:13
    • 231 - Responding to Incidents - 2:33
    • 232 - Providing Training - 5:32
    • 233 - Troubleshooting Personnel Issues - 2:28
  • Summary-7
    • 234 - Summary-7 - 1:41
  • Conclusion
    • 235 - Conclusion - 11:23

View Full Curriculum



Terms

  • Unredeemed licenses can be returned for store credit within 30 days of purchase. Once your license is redeemed, all sales are final.
×
Your Ad Blocker Is On!
Sadly, recent updates to your Ad Blocker are preventing crucial parts of our shop from loading. Frustrating. We know. We hate to nag, but please turn off your Ad Blocker or whitelist us to continue exploring our shop.