Autoplay
Autocomplete
Previous Lesson
Complete and Continue
CompTIA: Security+ (SY0-701)
0 - Welcome to CompTIA: Security+ (SY0-701)
0-1 - Course & Instructor Introduction (00:29)
0-2 - Additional Resources
1 - Networking Refresher (23:09)
1-1 - Basic Networking Overview (02:19)
1-2 - Common Network Protocols (09:57)
1-3 - Common Networking Devices (06:14)
1-4 - Network Design Considerations (02:48)
1-5 - Common Network Appliances (01:51)
2 - Security Basics (18:37)
2-1 - Basic Security Terms (04:33)
2-2 - Introduction to Security Controls (04:15)
2-3 - Defense-In-Depth (01:00)
2-4 - Basic Command Line Tools (05:57)
2-5 - Network & System Logs (02:52)
3 - Identity and Access Management (17:33)
3-1 - Authentication Overview (00:46)
3-2 - Authentication Factors (06:33)
3-3 - Account Types (01:23)
3-4 - Privileged Access Management (00:33)
3-5 - Account Management Best Practices (02:28)
3-6 - Secure Authentication Services (02:42)
3-7 - Access Control Models (03:08)
4 - Securing Networks (21:55)
4-1 - Detection Technologies (04:16)
4-2 - Wireless & Wireless Security (05:29)
4-3 - Wireless Attacks (06:02)
4-4 - Virtual Private Networks (VPNs) (03:36)
4-5 - Network Access Control (NAC) (01:00)
4-6 - VPN Authentication (01:32)
5 - Hosts & Data Security (30:08)
5-1 - Introduction to Virtualization (03:32)
5-2 - Deploy & Maintain Secure Systems (06:28)
5-3 - Data Loss Prevention (DLP) (02:50)
5-4 - Introduction to the Cloud (02:45)
5-5 - Securing the Cloud (06:01)
5-6 - Mobile Device Security (05:56)
5-7 - Embedded Systems (02:36)
6 - Common Threats (14:44)
6-1 - Threat Actors & Threat Vectors (02:31)
6-2 - Malware (05:48)
6-3 - Social Engineering (06:25)
7 - Advanced Attacks (31:03)
7-1 - Attack Frameworks & Threat Modeling (02:47)
7-2 - Network & System Attacks (02:54)
7-3 - Layer 2 Attacks (04:32)
7-4 - Secure Coding (09:32)
7-5 - Database Security (03:28)
7-6 - Code & Scripts (02:19)
7-7 - Application Security (05:31)
7-8 - Password Attacks (04:48)
8 - Security Controls (21:05)
8-1 - Physical Security Controls (07:29)
8-2 - Physical Attacks (03:31)
8-3 - Increasing Availability (04:59)
8-4 - Data Backups (05:06)
9 - Cryptography (18:09)
9-1 - Cryptography 101 (01:43)
9-2 - Hashing for Integrity (03:59)
9-3 - Encryption for Confidentiality (08:47)
9-4 - Public Key Infrastructure (PKI) (03:40)
10 - Risk (25:29)
10-1 - Risk 101 (09:15)
10-2 - Security Assessments & Testing (10:03)
10-3 - Network Monitoring Tools (01:42)
10-4 - Security Frameworks & Standards (04:29)
11 - Risk Mitigation Policies (19:23)
11-1 - What Are Security Policies? (06:48)
11-2 - Data Governance and Data Privacy (04:14)
11-3 - Data Retention and Sanitization (01:13)
11-4 - Data Handling User Training (01:49)
11-5 - Business Continuity & Disaster Recovery (05:19)
12 - Incident Response & Digital Forensics (12:38)
12-1 - Introduction to Incident Response (04:07)
12-2 - Introduction to Digital Forensics (04:11)
12-3 - Digital Forensics Evidence in Memory (01:28)
12-4 - Digital Forensics Tools (02:52)
2-2 - Introduction to Security Controls (04:15)
Lesson content locked
If you're already enrolled,
you'll need to login
.
Enroll in Course to Unlock