Section 01: Introduction |
|
Promo |
|
00:01:00 |
|
Introduction to CompTIA Security+ SY0-601 |
|
00:03:00 |
|
About the CompTIA Security+ SY0-601 Exam |
|
00:03:00 |
|
Resource – CompTIA Security+ SY0-601 Exam Objectives |
|
00:05:00 |
Section 02: Risk Management |
|
Defining Risk |
|
00:08:00 |
|
Threats and Vulnerabilities |
|
00:07:00 |
|
Threat Intelligence |
|
00:11:00 |
|
Risk Management Concepts |
|
00:07:00 |
|
Security Controls |
|
00:09:00 |
|
Risk Assessments and Treatments |
|
00:06:00 |
|
Quantitative Risk Assessments |
|
00:07:00 |
|
Qualitative Risk Assessments |
|
00:04:00 |
|
Business Impact Analysis |
|
00:09:00 |
|
Data Types and Roles |
|
00:11:00 |
|
Security and the Information Life Cycle |
|
00:09:00 |
|
Data Destruction |
|
00:06:00 |
|
Personnel Risk and Policies |
|
00:10:00 |
|
Third-Party Risk Management |
|
00:09:00 |
|
Agreement Types |
|
00:07:00 |
|
Exam Question Review |
|
00:02:00 |
|
Wiping Disks with the dd Command Lab |
|
00:06:00 |
|
Ask Me Anything (AMA) |
|
00:02:00 |
|
Handouts |
|
00:05:00 |
|
Lab Handouts |
|
00:05:00 |
Section 03: Cryptography |
|
Cryptography Basics |
|
00:16:00 |
|
Data Protection |
|
00:09:00 |
|
Cryptographic Methods |
|
00:07:00 |
|
Symmetric Cryptosystems |
|
00:13:00 |
|
Symmetric Block Modes |
|
00:08:00 |
|
Asymmetric Cryptosystems |
|
00:13:00 |
|
Diffie-Hellman |
|
00:07:00 |
|
Hashing |
|
00:09:00 |
|
Understanding Digital Certificates |
|
00:08:00 |
|
Trust Models |
|
00:05:00 |
|
Public Key Infrastructure |
|
00:04:00 |
|
Certificate Types |
|
00:14:00 |
|
Touring Certificates |
|
00:09:00 |
|
Cryptographic Attacks |
|
00:05:00 |
|
Password Cracking |
|
00:10:00 |
|
Password Cracking Demo |
|
00:06:00 |
|
Exam Question Review |
|
00:02:00 |
|
SSH Public Key Authentication Lab |
|
00:09:00 |
|
Ask Me Anything (AMA) |
|
00:02:00 |
|
Handouts |
|
00:05:00 |
|
Lab Handouts |
|
00:05:00 |
Section 04: Identity and Account Management |
|
Identification, Authentication, and Authorization |
|
00:08:00 |
|
Enabling Multifactor Authentication |
|
00:05:00 |
|
Authorization |
|
00:05:00 |
|
Accounting |
|
00:05:00 |
|
Authentication Methods |
|
00:14:00 |
|
Access Control Schemes |
|
00:07:00 |
|
Account Management |
|
00:13:00 |
|
Network Authentication |
|
00:09:00 |
|
Identity Management Systems |
|
00:06:00 |
|
Exam Question Review |
|
00:02:00 |
|
Creating LInux Users and Groups Lab |
|
00:06:00 |
|
Ask Me Anything (AMA) |
|
00:01:00 |
|
Handouts |
|
00:05:00 |
|
Lab Handouts |
|
00:05:00 |
Section 05: Tools of the Trade |
|
Touring the CLI |
|
00:16:00 |
|
Shells |
|
00:06:00 |
|
The Windows Command Line |
|
00:05:00 |
|
Microsoft PowerShell |
|
00:13:00 |
|
Linux Shells |
|
00:12:00 |
|
Python Scripts |
|
00:07:00 |
|
Windows Command-Line Tools |
|
00:16:00 |
|
Linux Command-Line Tools |
|
00:10:00 |
|
Network Scanners |
|
00:05:00 |
|
Network Scanning with Nmap |
|
00:09:00 |
|
Network Protocol Analyzers |
|
00:08:00 |
|
Using Wireshark to Analyze Network Traffic |
|
00:09:00 |
|
Using tcpdump to Analyze Network Traffic |
|
00:08:00 |
|
Log Files |
|
00:09:00 |
|
Centralized Logging |
|
00:09:00 |
|
Configuring Linux Log Forwarding |
|
00:08:00 |
|
Exam Question Review |
|
00:03:00 |
|
Lunux Shell Script Lab |
|
00:07:00 |
|
Nmap Lab |
|
00:05:00 |
|
Ask Me Anything (AMA) |
|
00:02:00 |
|
Handouts |
|
00:05:00 |
|
Lab Handouts Part 1 |
|
00:05:00 |
|
Lab Handouts Part 2 |
|
00:05:00 |
Section 06: Securing Individual Systems |
|
Malware |
|
00:14:00 |
|
Weak Configurations |
|
00:12:00 |
|
Common Attacks |
|
00:09:00 |
|
Driver and Overflow Attacks |
|
00:08:00 |
|
Password Attacks |
|
00:08:00 |
|
Bots and Botnets |
|
00:06:00 |
|
Disk RAID Levels |
|
00:10:00 |
|
Securing Hardware |
|
00:11:00 |
|
Securing Endpoints |
|
00:09:00 |
|
Exam Question Review |
|
00:02:00 |
|
Linux Software RAID Lab |
|
00:08:00 |
|
Ask Me Anything (AMA) |
|
00:02:00 |
|
Handouts |
|
00:05:00 |
|
Lab Handouts Part 1 |
|
00:05:00 |
|
Lab Handouts Part 2 |
|
00:05:00 |
Section 07: The Basic LAN |
|
The OSI Model |
|
00:13:00 |
|
ARP Cache Poisoning |
|
00:09:00 |
|
Other Layer 2 Attacks |
|
00:05:00 |
|
Network Planning |
|
00:07:00 |
|
Load Balancing |
|
00:06:00 |
|
Securing Network Access |
|
00:06:00 |
|
Honeypots |
|
00:06:00 |
|
Firewalls |
|
00:11:00 |
|
Proxy Servers |
|
00:06:00 |
|
Network and Port Address Translation |
|
00:07:00 |
|
IP Security (IPsec) |
|
00:09:00 |
|
Virtual Private Networks (VPNs) |
|
00:10:00 |
|
Intrusion Detection and Prevention Systems (IDS/IPS) |
|
00:13:00 |
|
Exam Question Review |
|
00:03:00 |
|
Linux Snort IDS Lab |
|
00:07:00 |
|
Ask Me Anything (AMA) |
|
00:01:00 |
|
Handouts |
|
00:05:00 |
|
Lab Handouts |
|
00:05:00 |
Section 08: Securing Wireless LANs |
|
Wi-Fi Encryption Standards |
|
00:10:00 |
|
RFID, NFC, and Bluetooth |
|
00:07:00 |
|
Wi-Fi Coverage and Performance |
|
00:08:00 |
|
Wi-Fi Discovery and Attacks |
|
00:12:00 |
|
Cracking WPA2 |
|
00:10:00 |
|
Wi-Fi Hardening |
|
00:11:00 |
|
Exam Question Review |
|
00:02:00 |
|
WPA2 Cracking Lab |
|
00:06:00 |
|
Ask Me Anything (AMA) |
|
00:01:00 |
|
Handouts |
|
00:05:00 |
|
Lab Handouts |
|
00:05:00 |
Section 09: Securing Public Servers |
|
Defining a Public Server |
|
00:01:00 |
|
Common Attacks and Mitigations |
|
00:10:00 |
|
Containers and Software-Defined Networking |
|
00:11:00 |
|
Hypervisors and Virtual Machines |
|
00:08:00 |
|
Cloud Deployment Models |
|
00:09:00 |
|
Cloud Service Models |
|
00:08:00 |
|
Securing the Cloud |
|
00:10:00 |
|
Exam Question Review |
|
00:02:00 |
|
Docker Container Lab |
|
00:04:00 |
|
Ask Me Anything (AMA) |
|
00:02:00 |
|
Handouts |
|
00:05:00 |
|
Lab Handouts |
|
00:05:00 |
Section 10: Securing Dedicated Systems |
|
Embedded Systems |
|
00:13:00 |
|
Industrial Control System (ICS) |
|
00:07:00 |
|
Internet of Things (IoT) Devices |
|
00:10:00 |
|
Connecting to Dedicated and Mobile Systems |
|
00:11:00 |
|
Security Constraints for Dedicated Systems |
|
00:05:00 |
|
Mobile Device Deployment and Hardening |
|
00:11:00 |
|
Exam Question Review |
|
00:03:00 |
|
Smartphone Hardening Lab |
|
00:03:00 |
|
Ask Me Anything (AMA) |
|
00:02:00 |
|
Handouts |
|
00:05:00 |
|
Lab Handouts |
|
00:05:00 |
Section 11: Physical Security |
|
Physical Security Overview |
|
00:01:00 |
|
Physical Security |
|
00:10:00 |
|
Keylogger Demo |
|
00:05:00 |
|
Environmental Controls |
|
00:05:00 |
|
Exam Question Review |
|
00:02:00 |
|
Physical Security Lab |
|
00:03:00 |
|
Ask Me Anything (AMA) |
|
00:03:00 |
|
Handouts |
|
00:05:00 |
|
Lab Handouts |
|
00:05:00 |
Section 12: Secure Protocols and Applications |
|
DNS Security |
|
00:05:00 |
|
FTP Packet Capture |
|
00:03:00 |
|
Secure Web and E-mail |
|
00:12:00 |
|
Request Forgery Attacks |
|
00:05:00 |
|
Cross-Site Scripting Attacks |
|
00:07:00 |
|
Web Application Security |
|
00:08:00 |
|
Web App Vulnerability Scanning |
|
00:06:00 |
|
Exam Question Review |
|
00:03:00 |
|
OWASP ZAP Web App Scan Lab |
|
00:04:00 |
|
Ask Me Anything (AMA) |
|
00:02:00 |
|
Handouts |
|
00:05:00 |
|
Lab Handouts |
|
00:05:00 |
Section 13: Testing Infrastructure |
|
Testing Infrastructure Overview |
|
00:05:00 |
|
Social Engineering |
|
00:06:00 |
|
Social Engineering Attacks |
|
00:11:00 |
|
Vulnerability Assessments |
|
00:09:00 |
|
Penetration Testing |
|
00:10:00 |
|
Security Assessment Tools |
|
00:12:00 |
|
The Metasploit Framework |
|
00:08:00 |
|
Exam Question Review |
|
00:02:00 |
|
Hping3 Forged Packet Lab |
|
00:06:00 |
|
Ask Me Anything (AMA) |
|
00:02:00 |
|
Handouts |
|
00:05:00 |
|
Lab Handouts |
|
00:05:00 |
Section 14: Dealing with Incidents |
|
Incident Response Overview |
|
00:03:00 |
|
Incident Response Plans (IRPs) |
|
00:06:00 |
|
Threat Analysis and Mitigating Actions |
|
00:08:00 |
|
Digital Forensics |
|
00:12:00 |
|
Gathering Digital Evidence |
|
00:10:00 |
|
Business Continuity and Alternate Sites |
|
00:06:00 |
|
Data Backup |
|
00:10:00 |
|
Exam Question Review |
|
00:01:00 |
|
Autopsy Forensic Browser Lab |
|
00:05:00 |
|
Ask Me Anything (AMA) |
|
00:02:00 |
|
Handouts |
|
00:05:00 |
|
Lab Handouts |
|
00:05:00 |