Total: Comptia Security+ Certification Course + Exam Sy0701

0dayddl

U P L O A D E R

9140a67263100c163a2702869eebeadf.jpg

Total: Comptia Security+ Certification Course + Exam Sy0-701
Last updated 7/2024
MP4 | Video: h264, 1920x1080 | Audio: AAC, 44.1 KHz
Language: English | Size: 20.55 GB | Duration: 20h 18m​

Everything you need to pass the CompTIA Security+ (SY0-701) exam from Mike Meyers, Dan Lachance, and Lyndon Williams!

What you'll learn

This is a complete and comprehensive CompTIA Security+ Certification (SY0-701) course. It is designed to prepare you to take and pass the CompTIA exam.

You will have the knowledge and confidence to pass the CompTIA exam AND the skills to be a great IT security tech.

Your new skills and the CompTIA Security+ cert will help you land a great security tech job or advance your cybersecurity career.

This course is ideal as both a study tool and an on-the-job reference for IT security tasks.

Requirements

Basic familiarity with computers and networks.

There are no specific prerequisites, since the course covers all the topics in detail.

It is a good idea to have an understanding of CompTIA A+ and Network+, or to be certified in these topics. You can learn more about these certifications from our Mike Meyers - Total Seminars CompTIA A+ and Network+ Certification courses on Udemy.

Description

The new CompTIA Security+ exam launched November 8th, 2023. Prep for your studies with our new video course covering all the updated objectives that were changed for the SY0-701 exam.Welcome to the TOTAL: CompTIA Security+ Certification (SY0-701), a course from the production studios of Total Seminars with subject matter experts Mike Meyers, Dan Lachance, and Lyndon Williams.This course covers everything you need to know to pass your CompTIA Security+ (SY0-701) certification exam, include a practice exam. This course will ensure you have the knowledge and skills to be a great entry-level cybersecurity tech AND help make sure you are ready to pass the CompTIA Security+ exam. Mike Meyers is well known as the "Alpha Geek." Mike is widely known as the #1 CompTIA author and instructor with over 1 million books in print. Dan Lachance is a highly motivated and passionate IT evangelist. He is a consultant, trainer, and author with over 20 years of experience in the IT security industry. Lyndon Williams creates innovative cybersecurity solutions with Cisco, Palo Alto, and Juniper platforms to provide business acceleration and produce intelligent, resilient automated response and remediation systems. He is also an instructor for CyberNow Labs, teaching students the necessary skills to start their journey toward becoming Cybersecurity Analysts.This course shows you how to:Apply the three "A's" of security: authentication, authorization, and accountingScan your wired or wireless network and assess it for various weaknessesUse cryptography to assure integrity of data through hashing and confidentiality of data through symmetric/asymmetric cryptosystems and public key infrastructure (PKI)Understand critical concepts in risk management, like setting up alerts, responding to incidents, and mitigating vulnerabilitiesIdentify how hackers are trying to get into your network, IT infrastructure, and physical assets and how security techs help prevent those breachesPrevent attacks ranging from simple malware to sophisticated exploits to social engineering that take advantage of people's trust, relationships, and lack of knowledgeSecure an enterprise environment, including creating incident response reports and disaster recovery plans as well as establishing business continuityWHY SHOULD I TAKE THIS COURSE?Total Seminars has an excellent reputation in the IT training industry, offering a wide variety of training tools. This course's subject matter experts, Mike Meyers, Dan Lachance, and Lyndon Williams, have a combined 60+ years of experience. Mike has created training materials for thousands of schools, corporations, and government agencies, and has taught numerous seminars for the FBI, DEA, and many other corporate partners; he also wrote several bestselling CompTIA certification guides. Dan is the owner of Lachance IT Consulting, Inc., and has taught many online IT training courses in addition to his work as a network and server consultant and IT security auditor. Lyndon Williams is a dedicated instructor and CISO of a top-level company. He uses his on-the-job knowledge to teach students how to use their new cybersecurity proficiency in real-world scenarios.This course will also prepare you for the CompTIA Security+ exam, which is an industry-standard certification, compliant with ISO 17024 standards, accredited by ANSI, and approved by the U.S. Department of Defense. If you're looking to advance your career, this certification is a great place to start. 96% of HR managers use IT certifications as screening or hiring criteria during recruitment.WHAT'S COVERED?The course covers all the CompTIA Security+ (SY0-701) objective domains:General Security Concepts - 12%Threats, Vulnerabilities, and Mitigations - 22%Security Architecture - 18%Security Operations - 28%Security Program Management and Oversight - 20%EXAM INFOExam code: SY0-701Max. 90 questions (performance-based and multiple choice)Length of exam: 90 minutesPassing score: 750 (on a scale of 100-900)Exam voucher cost: $392 USD (be sure to go to Total Seminars' website for discount vouchers!)Recommended experience: CompTIA Network+ and two years of experience working in a security/ systems administrator job roleTesting provider: Pearson VUE (in-person and online at-home options available)HOW DO I TAKE THE COMPTIA SECURITY+ EXAM?Buy an exam voucher (get your discount voucher at Total Seminars' website), schedule your exam on the Pearson VUE website, and then take the exam at a qualifying Pearson VUE testing center or virtually using their OnVue option.Schedule through a testing center: pearsonvue. comSchedule an at-home (or at-work) exam: onvue. comWHAT KIND OF JOB CAN I GET WITH A COMPTIA SECURITY+ CERTIFICATION?Security or systems administratorSecurity engineer/analystSecurity IT auditorIT project managerBeginner cybersecurity specialistJunior IT auditorJunior penetration tester

Overview

Section 1: Chapter 0 - About Security+

Lecture 1 Introduction to the CompTIA Security+ (SY0-701) Exam Prep Course

Lecture 2 About the CompTIA Security+ (SY0-701) Exam

Lecture 3 How to Take Your CompTIA Security+ (SY0-701) Exam

Section 2: Chapter 1 - Risk Management

Lecture 4 Defining Business Risk

Lecture 5 Threat Actors, Part 1

Lecture 6 Threat Actors, Part 2

Lecture 7 Threat Intelligence

Lecture 8 Risk Management Concepts

Lecture 9 Security Controls

Lecture 10 Risk Assessments and Treatments

Lecture 11 Quantitative Risk Assessments

Lecture 12 Qualitative Risk Assessments

Lecture 13 Security and the Information Life Cycle

Lecture 14 Data Destruction

Lecture 15 Chapter 1 Exam Question Review

Lecture 16 Wiping Disks with the dd Command Lab

Lecture 17 Chapter 1 Ask Me Anything (AMA)

Section 3: Chapter 2 - Foundations of Cryptography

Lecture 18 Cryptography Basics

Lecture 19 Hashing

Lecture 20 Cryptographic Attacks

Lecture 21 Password Cracking

Lecture 22 Password Cracking Demo

Lecture 23 Chapter 2 Exam Question Review

Lecture 24 SSH Public Key Authentication Lab

Lecture 25 Chapter 2 Ask Me Anything (AMA)

Section 4: Chapter 3 - Physical Security

Lecture 26 Physical Security Overview

Lecture 27 Physical Security

Lecture 28 Keylogger Demo

Lecture 29 Environmental Controls

Lecture 30 Chapter 3 Exam Question Review

Lecture 31 Physical Security Lab

Lecture 32 Chapter 3 Ask Me Anything (AMA)

Section 5: Chapter 4 - Identity and Account Management

Lecture 33 Identification, Authentication, and Authorization

Lecture 34 Enabling Multifactor Authentication

Lecture 35 Authorization

Lecture 36 Accounting

Lecture 37 Authentication Methods

Lecture 38 Access Control Schemes

Lecture 39 Account Management

Lecture 40 Network Authentication

Lecture 41 Identity Management Systems

Lecture 42 Chapter 4 Exam Question Review

Lecture 43 Creating Linux Users and Groups Lab

Lecture 44 Chapter 4 Ask Me Anything (AMA)

Section 6: Chapter 5 - Tools of the Trade

Lecture 45 Touring the CLI

Lecture 46 Shells

Lecture 47 The Windows Command Line

Lecture 48 Microsoft PowerShell

Lecture 49 Linux Shells

Lecture 50 Network Scanners

Lecture 51 Network Scanning with Nmap

Lecture 52 Network Protocol Analyzers

Lecture 53 Using Wireshark to Analyze Network Traffic

Lecture 54 Using tcpdump to Analyze Network Traffic

Lecture 55 Log Files

Lecture 56 Centralized Logging

Lecture 57 Cybersecurity Benchmark Tools

Lecture 58 Configuring Linux Log Forwarding

Lecture 59 Chapter 5 Exam Question Review

Lecture 60 Linux Shell Script Lab

Lecture 61 Nmap Lab

Lecture 62 Chapter 5 Ask Me Anything (AMA)

Section 7: Chapter 6 - Securing Individual Systems

Lecture 63 Malware

Lecture 64 Weak Configurations

Lecture 65 Common Attacks

Lecture 66 Overflow Attacks

Lecture 67 Password Attacks

Lecture 68 Bots and Botnets

Lecture 69 Disk RAID Levels

Lecture 70 Securing Hardware

Lecture 71 Securing Endpoints

Lecture 72 Securing Data with Encryption

Lecture 73 Chapter 6 Exam Question Review

Lecture 74 Linux Software RAID Lab

Lecture 75 Secure Enclave Lab in macOS

Lecture 76 Chapter 6 Ask Me Anything (AMA)

Section 8: Chapter 7 - Securing The Basic LAN

Lecture 77 Data Protection

Lecture 78 Cryptographic Methods

Lecture 79 Symmetric Cryptosystems

Lecture 80 Symmetric Block Modes

Lecture 81 Asymmetric Cryptosystems

Lecture 82 Understanding Digital Certificates

Lecture 83 Trust Models

Lecture 84 Public Key Infrastructure

Lecture 85 Certificate Types

Lecture 86 Touring Certificates

Lecture 87 Network Architecture Planning

Lecture 88 The OSI Model

Lecture 89 ARP Cache Poisoning

Lecture 90 Other Layer 2 Attacks

Lecture 91 Network Planning

Lecture 92 Zero Trust Network Access (ZTNA) 2.0

Lecture 93 Load Balancing

Lecture 94 Securing Network Access

Lecture 95 Honeypots

Lecture 96 Static and Dynamic Code Analysis

Lecture 97 Firewalls

Lecture 98 Proxy Servers

Lecture 99 Web Filtering

Lecture 100 Network and Port Address Translation

Lecture 101 IP Security (IPsec)

Lecture 102 SD-WAN and SASE

Lecture 103 Virtual Private Networks (VPNs)

Lecture 104 Intrusion Detection and Prevention Systems (IDS/IPS)

Lecture 105 Chapter 7 Exam Question Review

Lecture 106 Linux Snort IDS Lab

Lecture 107 Chapter 7 Ask Me Anything (AMA)

Section 9: Chapter 8 - Securing Wireless LANs

Lecture 108 Wi-Fi Encryption Standards

Lecture 109 RFID, NFC, and Bluetooth

Lecture 110 Wi-Fi Coverage and Performance

Lecture 111 Wi-Fi Discovery and Attacks

Lecture 112 Cracking WPA2

Lecture 113 Wi-Fi Hardening

Lecture 114 Chapter 8 Exam Question Review

Lecture 115 WPA2 Cracking Lab

Lecture 116 Chapter 8 Ask Me Anything (AMA)

Section 10: Chapter 9 - Securing Virtual and Cloud Environments

Lecture 117 Defending a Public Server

Lecture 118 Common Attacks and Mitigations

Lecture 119 DDoS Attacks in the Real World

Lecture 120 Containers and Software-Defined Networking

Lecture 121 Hypervisors and Virtual Machines

Lecture 122 Cloud Deployment Models

Lecture 123 Cloud Service Models

Lecture 124 Securing the Cloud

Lecture 125 Chapter 9 Exam Question Review

Lecture 126 Docker Container Lab

Lecture 127 Chapter 9 Ask Me Anything (AMA)

Section 11: Chapter 10 -Securing Dedicated and Mobile Systems

Lecture 128 Industrial Control System (ICS)

Lecture 129 Internet of Things (IoT) Devices

Lecture 130 Connecting to Dedicated and Mobile Systems

Lecture 131 Security Constraints for Dedicated Systems

Lecture 132 Mobile Device Deployment and Hardening

Lecture 133 Chapter 10 Exam Question Review

Lecture 134 Smartphone Hardening Lab

Lecture 135 Embedded Systems

Lecture 136 Chapter 10 Ask Me Anything (AMA)

Section 12: Chapter 11 - Secure Protocols and Applications

Lecture 137 DNS Security

Lecture 138 FTP Packet Capture

Lecture 139 Secure Web and E-mail

Lecture 140 Request Forgery Attacks

Lecture 141 Cross-Site Scripting Attacks

Lecture 142 Web Application Security

Lecture 143 OWASP Top 10

Lecture 144 Web App Vulnerability Scanning

Lecture 145 Chapter 11 Exam Question Review

Lecture 146 OWASP ZAP Web App Scan Lab

Lecture 147 Chapter 11 Ask Me Anything (AMA)

Section 13: Chapter 12 - Testing Infrastructure

Lecture 148 Testing Infrastructure Overview

Lecture 149 Social Engineering Attacks

Lecture 150 Vulnerability Assessments

Lecture 151 Penetration Testing

Lecture 152 The Metasploit Framework

Lecture 153 Chapter 12 Exam Question Review

Lecture 154 Chapter 12 Ask Me Anything (AMA)

Section 14: Chapter 13 - Business Security Impact

Lecture 155 Introduction to Business Security

Lecture 156 Business Impact Analysis

Lecture 157 Data Types and Roles

Lecture 158 Personnel Risk and Policies

Lecture 159 Attestation

Lecture 160 Internal Audits and Assessments

Lecture 161 External Audits and Assessments

Lecture 162 Third-Party Risk Management

Lecture 163 Agreement Types

Lecture 164 Change Management

Lecture 165 Technical Change Management

Lecture 166 What Is Automation and Orchestration?

Lecture 167 Benefits of Automation and Orchestration

Lecture 168 Use Cases of Automation and Orchestration

Lecture 169 Other Considerations of Automation and Orchestration

Lecture 170 Putting It All Together

Lecture 171 Exploring the NIST Frameworks

Section 15: Chapter 14 - Dealing with Incidents

Lecture 172 Incident Response Overview

Lecture 173 Incident Response Plans (IRPs)

Lecture 174 IRP Testing

Lecture 175 Threat Analysis and Mitigating Actions

Lecture 176 Digital Forensics

Lecture 177 Business Continuity and Alternate Sites

Lecture 178 Data Backup

Lecture 179 Chapter 14 Exam Question Review

Lecture 180 Autopsy Forensic Browser Lab

Lecture 181 Chapter 14 Ask Me Anything (AMA)

Section 16: Practice Exam

Section 17: Bonus Lecture

Lecture 182 Bonus Video

This course is intended for anyone who is preparing for an introductory-level cybersecurity position or looking to improve their security skills and become CompTIA Security+ certified.

I84OOGv3_o.jpg


Code:
Bitte Anmelden oder Registrieren um Code Inhalt zu sehen!
Code:
Bitte Anmelden oder Registrieren um Code Inhalt zu sehen!
Code:
Bitte Anmelden oder Registrieren um Code Inhalt zu sehen!
 
Kommentar

In der Börse ist nur das Erstellen von Download-Angeboten erlaubt! Ignorierst du das, wird dein Beitrag ohne Vorwarnung gelöscht. Ein Eintrag ist offline? Dann nutze bitte den Link  Offline melden . Möchtest du stattdessen etwas zu einem Download schreiben, dann nutze den Link  Kommentieren . Beide Links findest du immer unter jedem Eintrag/Download.

Data-Load.me | Data-Load.ing | Data-Load.to | Data-Load.in

Auf Data-Load.me findest du Links zu kostenlosen Downloads für Filme, Serien, Dokumentationen, Anime, Animation & Zeichentrick, Audio / Musik, Software und Dokumente / Ebooks / Zeitschriften. Wir sind deine Boerse für kostenlose Downloads!

Ist Data-Load legal?

Data-Load ist nicht illegal. Es werden keine zum Download angebotene Inhalte auf den Servern von Data-Load gespeichert.
Oben Unten