CompTIA Security+ SY0 - 701 Full Course and Labs

Prkos

U P L O A D E R
c16c3643e5c6f84f5adedc2944752701.jpg


CompTIA Security+ SY0-701 Full Course and Labs
Published 1/2024
MP4 | Video: h264, 1920x1080 | Audio: AAC, 44.1 KHz
Language: English | Size: 47.83 GB | Duration: 25h 42m

Pass your Security+ SY0-701 exam on the first try with a lab base approach to learning. Tons of labs.



What you'll learn
CompTIA Security+ exam objectives
Attacks against networks
Methods to protect a network
Full length Mock Exam


Requirements
Basics Networking and skills.


Description
This course will prepare you to pass the CompTIA Security+ SY0-701 exam on the first try. In this course, I will be using my 20+ years of experience teaching IT courses to give you a practical, hands-on approach to all of the CompTIA Security+ Certification exams. I will cover all of the exam objectives in detail. I am a best-selling udemy instructor with over 300,000 students. I have helped thousands of students to pass their certification exams over the last 20 years. My method of teaching is engaging and fun.I will review how to build your own lab to follow along with me in this journey so you can gain the practical knowledge needed not only to pass your Security+ exam but also how to apply it in the real world of being an IT technician.This course will cover the following domains:Attacks, Threats, and VulnerabilitiesArchitecture and DesignImplementationOperations and Incident ResponseGovernance, Risk, and ComplianceThis course will include:Over 200 lectures.Over 25 Hours of training.We will only be covering the topics on your exam, no-nonsense and personal stories.PDF of the exam objectives from CompTIA for the Security+ exam. Certificate of completion. Lifetime access. 30-day money-back guarantee.

Overview
Section 1: Introduction

Lecture 1 Exam Information

Lecture 2 Exam Domains

Lecture 3 Course Note Download

Section 2: Lesson 1: IT Security Fundamentals

Lecture 4 Introduction IT Security Fundamentals

Lecture 5 CIA Triad OB 1.2

Lecture 6 Confidentiality OB 1.2

Lecture 7 Integrity OB 1.2

Lecture 8 Availability OB 1.2

Lecture 9 DAD Triade OB 1.2

Lecture 10 Non-Repudiation OB 1.2

Lecture 11 Authentication OB 1.2

Lecture 12 Authorization OB 1.2

Lecture 13 Accounting OB 1.2

Lecture 14 Accountability OB 1.2

Lecture 15 Gap analysis OB 1.2

Lecture 16 Zero Trust OB 1.2

Section 3: Security Controls Categories and Types

Lecture 17 Control Categories OB 1.1

Lecture 18 Control Types OB 1.1

Lecture 19 Defense in Depth OB 1.1

Section 4: Threats

Lecture 20 Threats OB 2.1

Lecture 21 Attributes of Actors OB 2.1

Lecture 22 Threats Motivation OB 2.1

Lecture 23 Nation-state OB 2.1

Lecture 24 Unskilled Attacker OB 2.1

Lecture 25 Hacktivist OB 2.1

Lecture 26 Organized Crime OB 2.1

Lecture 27 Shadow IT OB 2.1

Lecture 28 Threat Vectors and Attack Surfaces OB 2.2

Section 5: Vulnerabilities

Lecture 29 Vulnerabilities OB 2.3

Lecture 30 Memory injection and buffer overflows OB 2.3

Lecture 31 Race Conditions OB 2.3

Lecture 32 Malicious Updates OB 2.3

Lecture 33 OS-Based Vulnerabilities OB 2.3

Lecture 34 SQL Injections OB 2.3

Lecture 35 XSS OB 2.3

Lecture 36 Hardware Vulnerabilities OB 2.3

Lecture 37 VM Vulnerabilities OB 2.3

Lecture 38 Cloud-specific Vulnerabilities OB 2.3

Lecture 39 Supply Chain Vulnerabilities OB 2.3

Lecture 40 Cryptographic Vulnerabilities OB 2.3

Lecture 41 Misconfiguration OB 2.3

Lecture 42 Mobile Device Vulnerabilities OB 2.3

Lecture 43 Zero-day Vulnerabilities OB 2.3

Section 6: Signs of Attacks

Lecture 44 Malware OB 2.4

Lecture 45 Viruses OB 2.4

Lecture 46 Worms OB 2.4

Lecture 47 Trojans OB 2.4

Lecture 48 Ransomware OB 2.4

Lecture 49 Spyware OB 2.4

Lecture 50 Rootkit OB 2.4

Lecture 51 Logic Bomb OB 2.4

Lecture 52 Keyloggers OB 2.4

Lecture 53 Bloatware OB 2.4

Lecture 54 DDOS OB 2.4

Lecture 55 DNS OB 2.4

Lecture 56 Onpath Attack OB 2.4

Lecture 57 Credential Replay OB 2.4

Lecture 58 Privilege Escalation OB 2.4

Lecture 59 Request Forgery OB 2.4

Lecture 60 Directory Traversal OB 2.4

Lecture 61 Indicators of Malicious Activity OB 2.4

Section 7: Cryptography

Lecture 62 Intro to cryptography OB 1.4

Lecture 63 Crypto Terms OB 1.4

Lecture 64 Goals Cryptography OB 1.4

Lecture 65 Algorithm vs Keys OB 1.4

Lecture 66 Ciphers OB 1.4

Lecture 67 Symmetric Encryption OB 1.4

Lecture 68 Symmetric Algorithms OB 1.4

Lecture 69 Asymmetric Encryption OB 1.4

Lecture 70 Asymmetric Algorithms OB 1.4

Lecture 71 Hybrid Cryptography OB 1.4

Lecture 72 Hashing OB 1.4

Lecture 73 Hashing Algorithms OB 1.4

Lecture 74 Digital Signatures OB 1.4

Lecture 75 Intro to PKI OB 1.4

Lecture 76 PKI Purpose OB 1.4

Lecture 77 SSL/TLS Handshake OB 1.4

Lecture 78 PKI Process OB 1.4

Lecture 79 Certificates OB 1.4

Lecture 80 PKI Root of Trust OB 1.4

Lecture 81 PKI Verification and Revocation OB 1.4

Lecture 82 Steganography OB 1.4

Lecture 83 Blockchain OB 1.4

Lecture 84 Salting OB 1.4

Lecture 85 TPM OB 1.4

Lecture 86 Secure Enclave OB 1.4

Lecture 87 Obfuscation OB 1.4

Lecture 88 Tokenization OB 1.4

Lecture 89 Key Escrow OB 1.4

Lecture 90 HSM OB 1.4

Section 8: Social Engineering

Lecture 91 Social Engineering OB 2.2

Lecture 92 Phishing OB 2.2

Lecture 93 Vishing OB 2.2

Lecture 94 Smishing OB 2.2

Lecture 95 Spear Phishing OB 2.2

Lecture 96 Misinformation and Disinformation OB 2.2

Lecture 97 Impersonation OB 2.2

Lecture 98 Business Email Compromise OB 2.2

Lecture 99 Pretexting OB 2.2

Lecture 100 Watering Hole OB 2.2

Lecture 101 Brand Impersonation OB 2.2

Lecture 102 Typosquatting OB 2.2

Section 9: Securing IT Assets

Lecture 103 Segmentation OB 2.5

Lecture 104 Isolation OB 2.5

Lecture 105 Access Control OB 2.5

Lecture 106 Principles of Least Privilege OB 2.5

Lecture 107 Access Control List OB 2.5

Lecture 108 Filesystem Permissions OB 2.5

Lecture 109 Application Allow List OB 2.5

Lecture 110 Patching OB 2.5

Lecture 111 Configuration Enforcement OB 2.5

Lecture 112 Decommissioning OB 2.5

Lecture 113 Monitoring OB 2.5

Lecture 114 Hardening Techniques OB 2.5

Section 10: Security Principles

Lecture 115 Infrastructure Considerations OB 3.2

Lecture 116 Device Placement OB 3.2

Lecture 117 Security Zones OB 3.2

Lecture 118 Attack Surface OB 3.2

Lecture 119 Failure Modes OB 3.2

Lecture 120 Device Attributes OB 3.2

Lecture 121 Network Appliances and Sensors OB 3.2

Lecture 122 Jump Server OB 3.2

Lecture 123 Proxy Servers OB 3.2

Lecture 124 IDS/IPS OB 3.2

Lecture 125 Load Balancer OB 3.2

Lecture 126 802.1x and EAP OB 3.2

Lecture 127 Firewalls OB 3.2

Lecture 128 VPN OB 3.2

Lecture 129 SD-WAN OB 3.2

Lecture 130 Selecting Effective Controls OB 3.2

Section 11: Security Architecture

Lecture 131 Cloud OB 3.1

Lecture 132 Infrastructure as Code OB 3.1

Lecture 133 Serverless Architecture OB 3.1

Lecture 134 Microservices OB 3.1

Lecture 135 Air Gapped OB 3.1

Lecture 136 Software-Defined Networking OB 3.1

Lecture 137 On-Premises OB 3.1

Lecture 138 Centralized vs. Decentralized OB 3.1

Lecture 139 Virtualization OB 3.1

Lecture 140 Containerization OB 3.1

Lecture 141 High Availability OB 3.1

Lecture 142 IoT OB 3.1

Lecture 143 ICS OB 3.1

Lecture 144 Security Architecture Considerations OB 3.1

Lecture 145 RTOS and Embedded Systems OB 3.1

Section 12: Data Protection

Lecture 146 Regulated Data OB 3.3

Lecture 147 Intellectual Property OB 3.3

Lecture 148 Legal and Financial Data OB 3.3

Lecture 149 Data Classification OB 3.3

Lecture 150 Geolocation and Sovereignty OB 3.3

Lecture 151 Methods to Secure Data OB 3.3

Section 13: Common Security Techniques

Lecture 152 Secure Baselines OB 4.1

Lecture 153 Hardening Devices OB 4.1

Lecture 154 Installations of Mobile Devices OB 4.1

Lecture 155 Mobile Solutions and MDM OB 4.1

Lecture 156 Mobile Connection Methods OB 4.1

Lecture 157 Wireless Security OB 4.1

Lecture 158 Application Security Methods OB 4.1

Lecture 159 Security Monitoring OB 4.1

Section 14: Hardware, software and Data Asset Management

Lecture 160 Acquisition Procurement OB 4.2

Lecture 161 Assignment and Accounting OB 4.2

Lecture 162 Monitoring and Tracking OB 4.2

Lecture 163 Disposal and Decommission OB 4.2

Section 15: Vulnerability Management

Lecture 164 Vulnerability Scan OB 4.3

Lecture 165 Application Security Testing OB 4.3

Lecture 166 Threat Feeds OB 4.3

Lecture 167 Penetration Testing OB 4.3

Lecture 168 Bug Bounty Program OB 4.3

Lecture 169 False Positive vs. False Negative OB 4.3

Lecture 170 CVE and CVSS OB 4.3

Lecture 171 Vulnerability Responses OB 4.3

Section 16: Alerting and Monitoring IT

Lecture 172 Monitoring Resources OB 4.4

Lecture 173 Monitoring Activities OB 4.4

Lecture 174 Alerting and Monitoring Tools SIEM and DLP's OB 4.4

Section 17: Enhance Security

Lecture 175 Firewall Configuration OB 4.5

Lecture 176 Web Filters OB 4.5

Lecture 177 Operating System Security OB 4.5

Lecture 178 Secure Protocols OB 4.5

Lecture 179 DNS Filter OB 4.5

Lecture 180 Email security OB 4.5

Lecture 181 File Integrity Monitoring OB 4.5

Lecture 182 Network Access Control OB 4.5

Lecture 183 EDR OB 4.5

Lecture 184 User Behavior Analytics OB 4.5

Section 18: Identity and Access Management (IAM)

Lecture 185 Provisioning Users OB 4.6

Lecture 186 Single Sign-on OB 4.6

Lecture 187 Federation and SAML OB 4.6

Lecture 188 Access Control Models OB 4.6

Lecture 189 Multifactor Authentication OB 4.6

Lecture 190 Authentication tokens OB 4.6

Lecture 191 Biometric OB 4.6

Lecture 192 Password Management OB 4.6

Section 19: Automation and Orchestration

Lecture 193 Automation and Orchestration OB 4.7

Section 20: Incident Response

Lecture 194 Incident Response Steps OB 4.8

Lecture 195 Incident Response Training OB 4.8

Lecture 196 Digital Forensics OB 4.8

Section 21: Supporting an investigation

Lecture 197 Types of logs OB 4.9

Section 22: Security Governance

Lecture 198 Security Polices, Standards, Guidelines and Procedures OB 5.1

Lecture 199 Security Governance Considerations and Revisions OB 5.1

Lecture 200 Security Governance Structures OB 5.1

Lecture 201 Security Governance Roles OB 5.1

Section 23: Risk Management

Lecture 202 Risk Terms OB 5.2

Lecture 203 Risk Identification and Assessment Times OB 5.2

Lecture 204 Quantitative and Qualitive Risk Assessment OB 5.2

Lecture 205 Risk Register OB 5.2

Lecture 206 Risk Appetite OB 5.2

Lecture 207 Risk Response OB 5.2

Lecture 208 Business Impact Assessment OB 5.2

Section 24: Vendor Management

Lecture 209 Vendor Assessment and Selection OB 5.3

Lecture 210 Vendor Agreements OB 5.3

Section 25: Security Compliance

Lecture 211 Compliance Reporting OB 5.4

Lecture 212 Privacy OB 5.4

Section 26: Audits and Assessments

Lecture 213 Internal and External Assessments OB 5.5

Lecture 214 Penetration Test OB 5.5

Section 27: Security Awareness Training

Lecture 215 Training against Phishing OB 5.6

Lecture 216 Security Awareness Program OB 5.6

Section 28: Physical Security

Lecture 217 Physical Security

Lecture 218 Deception and Disruption Technology

Section 29: Changement Management

Lecture 219 Change management OB 1.3

Lecture 220 Technical Implications OB 1.3

Section 30: Resilience and Recovery

Lecture 221 High Availability OB 3.4

Lecture 222 Site Selection OB 3.4

Lecture 223 Capacity Planning OB 3.4

Lecture 224 Testing OB 3.4

Lecture 225 Backups OB 3.4

Lecture 226 Power OB 3.4

Section 31: Labs

Lecture 227 Lab intro

Lecture 228 Installing Windows on VirtualBox

Lecture 229 Installing Kali Linux

Lecture 230 Using Snapshots

Lecture 231 Using an IP Scanner

Lecture 232 Using the Nessus Vulnerability scanner

Lecture 233 Cracking a Password with Kali

Lecture 234 Cracking a password with a lookup table

Lecture 235 Scanner a website for vulnerabilities

Lecture 236 Using Wireshark to capture network traffic

Lecture 237 Installing and Using SSH

Lecture 238 Securing Windows with Password Complexity

Lecture 239 Using Steganography to hide messages

Lecture 240 Encrypting a hard drive

Lecture 241 Implementing Role Based Access Control in Windows

Lecture 242 Assigning Permissions to folders

Lecture 243 Configure Firewall rules

Lecture 244 Updating a Computer

Lecture 245 Hardening a Desktop using group policy

Lecture 246 Securing a wireless network

Lecture 247 Using Encrypting File System

Lecture 248 Backing up router configuration

Lecture 249 Updating firmware on a router

Lecture 250 Configuring a DMZ

Lecture 251 Using tor network

Lecture 252 Configuring VLAN's

Lecture 253 Setting up an IPS

Lecture 254 Configuring web filters

Anyone looking to get CompTIA Security+ Certified


Homepage
Code:
Bitte Anmelden oder Registrieren um Code Inhalt zu sehen!

468495171_139-virtualization-ob-31_s.jpg


Code:
Bitte Anmelden oder Registrieren um Code Inhalt zu sehen!
Code:
Bitte Anmelden oder Registrieren um Code Inhalt zu sehen!
 
Kommentar

In der Börse ist nur das Erstellen von Download-Angeboten erlaubt! Ignorierst du das, wird dein Beitrag ohne Vorwarnung gelöscht. Ein Eintrag ist offline? Dann nutze bitte den Link  Offline melden . Möchtest du stattdessen etwas zu einem Download schreiben, dann nutze den Link  Kommentieren . Beide Links findest du immer unter jedem Eintrag/Download.

Data-Load.me | Data-Load.ing | Data-Load.to

Auf Data-Load.me findest du Links zu kostenlosen Downloads für Filme, Serien, Dokumentationen, Anime, Animation & Zeichentrick, Audio / Musik, Software und Dokumente / Ebooks / Zeitschriften. Wir sind deine Boerse für kostenlose Downloads!

Ist Data-Load legal?

Data-Load ist nicht illegal. Es werden keine zum Download angebotene Inhalte auf den Servern von Data-Load gespeichert.
Oben Unten