07-26-2024, 11:40 AM
Total: Comptia Security+ Certification Course + Exam Sy0-701
Last updated 7/2024
MP4 | Video: h264, 1920x1080 | Audio: AAC, 44.1 KHz
Language: English | Size: 20.55 GB | Duration: 20h 18m
Everything you need to pass the CompTIA Security+ (SY0-701) exam from Mike Meyers, Dan Lachance, and Lyndon Williams!
[b]What you'll learn[/b]
This is a complete and comprehensive CompTIA Security+ Certification (SY0-701) course. It is designed to prepare you to take and pass the CompTIA exam.
You will have the knowledge and confidence to pass the CompTIA exam AND the skills to be a great IT security tech.
Your new skills and the CompTIA Security+ cert will help you land a great security tech job or advance your cybersecurity career.
This course is ideal as both a study tool and an on-the-job reference for IT security tasks.
[b]Requirements[/b]
Basic familiarity with computers and networks.
There are no specific prerequisites, since the course covers all the topics in detail.
It is a good idea to have an understanding of CompTIA A+ and Network+, or to be certified in these topics. You can learn more about these certifications from our Mike Meyers - Total Seminars CompTIA A+ and Network+ Certification courses on Udemy.
[b]Description[/b]
The new CompTIA Security+ exam launched November 8th, 2023. Prep for your studies with our new video course covering all the updated objectives that were changed for the SY0-701 exam.Welcome to the TOTAL: CompTIA Security+ Certification (SY0-701), a course from the production studios of Total Seminars with subject matter experts Mike Meyers, Dan Lachance, and Lyndon Williams.This course covers everything you need to know to pass your CompTIA Security+ (SY0-701) certification exam, include a practice exam. This course will ensure you have the knowledge and skills to be a great entry-level cybersecurity tech AND help make sure you are ready to pass the CompTIA Security+ exam. Mike Meyers is well known as the "Alpha Geek." Mike is widely known as the #1 CompTIA author and instructor with over 1 million books in print. Dan Lachance is a highly motivated and passionate IT evangelist. He is a consultant, trainer, and author with over 20 years of experience in the IT security industry. Lyndon Williams creates innovative cybersecurity solutions with Cisco, Palo Alto, and Juniper platforms to provide business acceleration and produce intelligent, resilient automated response and remediation systems. He is also an instructor for CyberNow Labs, teaching students the necessary skills to start their journey toward becoming Cybersecurity Analysts.This course shows you how to:Apply the three "A's" of security: authentication, authorization, and accountingScan your wired or wireless network and assess it for various weaknessesUse cryptography to assure integrity of data through hashing and confidentiality of data through symmetric/asymmetric cryptosystems and public key infrastructure (PKI)Understand critical concepts in risk management, like setting up alerts, responding to incidents, and mitigating vulnerabilitiesIdentify how hackers are trying to get into your network, IT infrastructure, and physical assets and how security techs help prevent those breachesPrevent attacks ranging from simple malware to sophisticated exploits to social engineering that take advantage of people's trust, relationships, and lack of knowledgeSecure an enterprise environment, including creating incident response reports and disaster recovery plans as well as establishing business continuityWHY SHOULD I TAKE THIS COURSE?Total Seminars has an excellent reputation in the IT training industry, offering a wide variety of training tools. This course's subject matter experts, Mike Meyers, Dan Lachance, and Lyndon Williams, have a combined 60+ years of experience. Mike has created training materials for thousands of schools, corporations, and government agencies, and has taught numerous seminars for the FBI, DEA, and many other corporate partners; he also wrote several bestselling CompTIA certification guides. Dan is the owner of Lachance IT Consulting, Inc., and has taught many online IT training courses in addition to his work as a network and server consultant and IT security auditor. Lyndon Williams is a dedicated instructor and CISO of a top-level company. He uses his on-the-job knowledge to teach students how to use their new cybersecurity proficiency in real-world scenarios.This course will also prepare you for the CompTIA Security+ exam, which is an industry-standard certification, compliant with ISO 17024 standards, accredited by ANSI, and approved by the U.S. Department of Defense. If you're looking to advance your career, this certification is a great place to start. 96% of HR managers use IT certifications as screening or hiring criteria during recruitment.WHAT'S COVERED?The course covers all the CompTIA Security+ (SY0-701) objective domains:General Security Concepts - 12%Threats, Vulnerabilities, and Mitigations - 22%Security Architecture - 18%Security Operations - 28%Security Program Management and Oversight - 20%EXAM INFOExam code: SY0-701Max. 90 questions (performance-based and multiple choice)Length of exam: 90 minutesPassing score: 750 (on a scale of 100-900)Exam voucher cost: $392 USD (be sure to go to Total Seminars' website for discount vouchers!)Recommended experience: CompTIA Network+ and two years of experience working in a security/ systems administrator job roleTesting provider: Pearson VUE (in-person and online at-home options available)HOW DO I TAKE THE COMPTIA SECURITY+ EXAM?Buy an exam voucher (get your discount voucher at Total Seminars' website), schedule your exam on the Pearson VUE website, and then take the exam at a qualifying Pearson VUE testing center or virtually using their OnVue option.Schedule through a testing center: pearsonvue. comSchedule an at-home (or at-work) exam: onvue. comWHAT KIND OF JOB CAN I GET WITH A COMPTIA SECURITY+ CERTIFICATION?Security or systems administratorSecurity engineer/analystSecurity IT auditorIT project managerBeginner cybersecurity specialistJunior IT auditorJunior penetration tester
Overview
Section 1: Chapter 0 - About Security+
Lecture 1 Introduction to the CompTIA Security+ (SY0-701) Exam Prep Course
Lecture 2 About the CompTIA Security+ (SY0-701) Exam
Lecture 3 How to Take Your CompTIA Security+ (SY0-701) Exam
Section 2: Chapter 1 - Risk Management
Lecture 4 Defining Business Risk
Lecture 5 Threat Actors, Part 1
Lecture 6 Threat Actors, Part 2
Lecture 7 Threat Intelligence
Lecture 8 Risk Management Concepts
Lecture 9 Security Controls
Lecture 10 Risk Assessments and Treatments
Lecture 11 Quantitative Risk Assessments
Lecture 12 Qualitative Risk Assessments
Lecture 13 Security and the Information Life Cycle
Lecture 14 Data Destruction
Lecture 15 Chapter 1 Exam Question Review
Lecture 16 Wiping Disks with the dd Command Lab
Lecture 17 Chapter 1 Ask Me Anything (AMA)
Section 3: Chapter 2 - Foundations of Cryptography
Lecture 18 Cryptography Basics
Lecture 19 Hashing
Lecture 20 Cryptographic Attacks
Lecture 21 Password Cracking
Lecture 22 Password Cracking Demo
Lecture 23 Chapter 2 Exam Question Review
Lecture 24 SSH Public Key Authentication Lab
Lecture 25 Chapter 2 Ask Me Anything (AMA)
Section 4: Chapter 3 - Physical Security
Lecture 26 Physical Security Overview
Lecture 27 Physical Security
Lecture 28 Keylogger Demo
Lecture 29 Environmental Controls
Lecture 30 Chapter 3 Exam Question Review
Lecture 31 Physical Security Lab
Lecture 32 Chapter 3 Ask Me Anything (AMA)
Section 5: Chapter 4 - Identity and Account Management
Lecture 33 Identification, Authentication, and Authorization
Lecture 34 Enabling Multifactor Authentication
Lecture 35 Authorization
Lecture 36 Accounting
Lecture 37 Authentication Methods
Lecture 38 Access Control Schemes
Lecture 39 Account Management
Lecture 40 Network Authentication
Lecture 41 Identity Management Systems
Lecture 42 Chapter 4 Exam Question Review
Lecture 43 Creating Linux Users and Groups Lab
Lecture 44 Chapter 4 Ask Me Anything (AMA)
Section 6: Chapter 5 - Tools of the Trade
Lecture 45 Touring the CLI
Lecture 46 Shells
Lecture 47 The Windows Command Line
Lecture 48 Microsoft PowerShell
Lecture 49 Linux Shells
Lecture 50 Network Scanners
Lecture 51 Network Scanning with Nmap
Lecture 52 Network Protocol Analyzers
Lecture 53 Using Wireshark to Analyze Network Traffic
Lecture 54 Using tcpdump to Analyze Network Traffic
Lecture 55 Log Files
Lecture 56 Centralized Logging
Lecture 57 Cybersecurity Benchmark Tools
Lecture 58 Configuring Linux Log Forwarding
Lecture 59 Chapter 5 Exam Question Review
Lecture 60 Linux Shell Script Lab
Lecture 61 Nmap Lab
Lecture 62 Chapter 5 Ask Me Anything (AMA)
Section 7: Chapter 6 - Securing Individual Systems
Lecture 63 Malware
Lecture 64 Weak Configurations
Lecture 65 Common Attacks
Lecture 66 Overflow Attacks
Lecture 67 Password Attacks
Lecture 68 Bots and Botnets
Lecture 69 Disk RAID Levels
Lecture 70 Securing Hardware
Lecture 71 Securing Endpoints
Lecture 72 Securing Data with Encryption
Lecture 73 Chapter 6 Exam Question Review
Lecture 74 Linux Software RAID Lab
Lecture 75 Secure Enclave Lab in macOS
Lecture 76 Chapter 6 Ask Me Anything (AMA)
Section 8: Chapter 7 - Securing The Basic LAN
Lecture 77 Data Protection
Lecture 78 Cryptographic Methods
Lecture 79 Symmetric Cryptosystems
Lecture 80 Symmetric Block Modes
Lecture 81 Asymmetric Cryptosystems
Lecture 82 Understanding Digital Certificates
Lecture 83 Trust Models
Lecture 84 Public Key Infrastructure
Lecture 85 Certificate Types
Lecture 86 Touring Certificates
Lecture 87 Network Architecture Planning
Lecture 88 The OSI Model
Lecture 89 ARP Cache Poisoning
Lecture 90 Other Layer 2 Attacks
Lecture 91 Network Planning
Lecture 92 Zero Trust Network Access (ZTNA) 2.0
Lecture 93 Load Balancing
Lecture 94 Securing Network Access
Lecture 95 Honeypots
Lecture 96 Static and Dynamic Code Analysis
Lecture 97 Firewalls
Lecture 98 Proxy Servers
Lecture 99 Web Filtering
Lecture 100 Network and Port Address Translation
Lecture 101 IP Security (IPsec)
Lecture 102 SD-WAN and SASE
Lecture 103 Virtual Private Networks (VPNs)
Lecture 104 Intrusion Detection and Prevention Systems (IDS/IPS)
Lecture 105 Chapter 7 Exam Question Review
Lecture 106 Linux Snort IDS Lab
Lecture 107 Chapter 7 Ask Me Anything (AMA)
Section 9: Chapter 8 - Securing Wireless LANs
Lecture 108 Wi-Fi Encryption Standards
Lecture 109 RFID, NFC, and Bluetooth
Lecture 110 Wi-Fi Coverage and Performance
Lecture 111 Wi-Fi Discovery and Attacks
Lecture 112 Cracking WPA2
Lecture 113 Wi-Fi Hardening
Lecture 114 Chapter 8 Exam Question Review
Lecture 115 WPA2 Cracking Lab
Lecture 116 Chapter 8 Ask Me Anything (AMA)
Section 10: Chapter 9 - Securing Virtual and Cloud Environments
Lecture 117 Defending a Public Server
Lecture 118 Common Attacks and Mitigations
Lecture 119 DDoS Attacks in the Real World
Lecture 120 Containers and Software-Defined Networking
Lecture 121 Hypervisors and Virtual Machines
Lecture 122 Cloud Deployment Models
Lecture 123 Cloud Service Models
Lecture 124 Securing the Cloud
Lecture 125 Chapter 9 Exam Question Review
Lecture 126 Docker Container Lab
Lecture 127 Chapter 9 Ask Me Anything (AMA)
Section 11: Chapter 10 -Securing Dedicated and Mobile Systems
Lecture 128 Industrial Control System (ICS)
Lecture 129 Internet of Things (IoT) Devices
Lecture 130 Connecting to Dedicated and Mobile Systems
Lecture 131 Security Constraints for Dedicated Systems
Lecture 132 Mobile Device Deployment and Hardening
Lecture 133 Chapter 10 Exam Question Review
Lecture 134 Smartphone Hardening Lab
Lecture 135 Embedded Systems
Lecture 136 Chapter 10 Ask Me Anything (AMA)
Section 12: Chapter 11 - Secure Protocols and Applications
Lecture 137 DNS Security
Lecture 138 FTP Packet Capture
Lecture 139 Secure Web and E-mail
Lecture 140 Request Forgery Attacks
Lecture 141 Cross-Site Scripting Attacks
Lecture 142 Web Application Security
Lecture 143 OWASP Top 10
Lecture 144 Web App Vulnerability Scanning
Lecture 145 Chapter 11 Exam Question Review
Lecture 146 OWASP ZAP Web App Scan Lab
Lecture 147 Chapter 11 Ask Me Anything (AMA)
Section 13: Chapter 12 - Testing Infrastructure
Lecture 148 Testing Infrastructure Overview
Lecture 149 Social Engineering Attacks
Lecture 150 Vulnerability Assessments
Lecture 151 Penetration Testing
Lecture 152 The Metasploit Framework
Lecture 153 Chapter 12 Exam Question Review
Lecture 154 Chapter 12 Ask Me Anything (AMA)
Section 14: Chapter 13 - Business Security Impact
Lecture 155 Introduction to Business Security
Lecture 156 Business Impact Analysis
Lecture 157 Data Types and Roles
Lecture 158 Personnel Risk and Policies
Lecture 159 Attestation
Lecture 160 Internal Audits and Assessments
Lecture 161 External Audits and Assessments
Lecture 162 Third-Party Risk Management
Lecture 163 Agreement Types
Lecture 164 Change Management
Lecture 165 Technical Change Management
Lecture 166 What Is Automation and Orchestration?
Lecture 167 Benefits of Automation and Orchestration
Lecture 168 Use Cases of Automation and Orchestration
Lecture 169 Other Considerations of Automation and Orchestration
Lecture 170 Putting It All Together
Lecture 171 Exploring the NIST Frameworks
Section 15: Chapter 14 - Dealing with Incidents
Lecture 172 Incident Response Overview
Lecture 173 Incident Response Plans (IRPs)
Lecture 174 IRP Testing
Lecture 175 Threat Analysis and Mitigating Actions
Lecture 176 Digital Forensics
Lecture 177 Business Continuity and Alternate Sites
Lecture 178 Data Backup
Lecture 179 Chapter 14 Exam Question Review
Lecture 180 Autopsy Forensic Browser Lab
Lecture 181 Chapter 14 Ask Me Anything (AMA)
Section 16: Practice Exam
Section 17: Bonus Lecture
Lecture 182 Bonus Video
This course is intended for anyone who is preparing for an introductory-level cybersecurity position or looking to improve their security skills and become CompTIA Security+ certified.
[b]What you'll learn[/b]
This is a complete and comprehensive CompTIA Security+ Certification (SY0-701) course. It is designed to prepare you to take and pass the CompTIA exam.
You will have the knowledge and confidence to pass the CompTIA exam AND the skills to be a great IT security tech.
Your new skills and the CompTIA Security+ cert will help you land a great security tech job or advance your cybersecurity career.
This course is ideal as both a study tool and an on-the-job reference for IT security tasks.
[b]Requirements[/b]
Basic familiarity with computers and networks.
There are no specific prerequisites, since the course covers all the topics in detail.
It is a good idea to have an understanding of CompTIA A+ and Network+, or to be certified in these topics. You can learn more about these certifications from our Mike Meyers - Total Seminars CompTIA A+ and Network+ Certification courses on Udemy.
[b]Description[/b]
The new CompTIA Security+ exam launched November 8th, 2023. Prep for your studies with our new video course covering all the updated objectives that were changed for the SY0-701 exam.Welcome to the TOTAL: CompTIA Security+ Certification (SY0-701), a course from the production studios of Total Seminars with subject matter experts Mike Meyers, Dan Lachance, and Lyndon Williams.This course covers everything you need to know to pass your CompTIA Security+ (SY0-701) certification exam, include a practice exam. This course will ensure you have the knowledge and skills to be a great entry-level cybersecurity tech AND help make sure you are ready to pass the CompTIA Security+ exam. Mike Meyers is well known as the "Alpha Geek." Mike is widely known as the #1 CompTIA author and instructor with over 1 million books in print. Dan Lachance is a highly motivated and passionate IT evangelist. He is a consultant, trainer, and author with over 20 years of experience in the IT security industry. Lyndon Williams creates innovative cybersecurity solutions with Cisco, Palo Alto, and Juniper platforms to provide business acceleration and produce intelligent, resilient automated response and remediation systems. He is also an instructor for CyberNow Labs, teaching students the necessary skills to start their journey toward becoming Cybersecurity Analysts.This course shows you how to:Apply the three "A's" of security: authentication, authorization, and accountingScan your wired or wireless network and assess it for various weaknessesUse cryptography to assure integrity of data through hashing and confidentiality of data through symmetric/asymmetric cryptosystems and public key infrastructure (PKI)Understand critical concepts in risk management, like setting up alerts, responding to incidents, and mitigating vulnerabilitiesIdentify how hackers are trying to get into your network, IT infrastructure, and physical assets and how security techs help prevent those breachesPrevent attacks ranging from simple malware to sophisticated exploits to social engineering that take advantage of people's trust, relationships, and lack of knowledgeSecure an enterprise environment, including creating incident response reports and disaster recovery plans as well as establishing business continuityWHY SHOULD I TAKE THIS COURSE?Total Seminars has an excellent reputation in the IT training industry, offering a wide variety of training tools. This course's subject matter experts, Mike Meyers, Dan Lachance, and Lyndon Williams, have a combined 60+ years of experience. Mike has created training materials for thousands of schools, corporations, and government agencies, and has taught numerous seminars for the FBI, DEA, and many other corporate partners; he also wrote several bestselling CompTIA certification guides. Dan is the owner of Lachance IT Consulting, Inc., and has taught many online IT training courses in addition to his work as a network and server consultant and IT security auditor. Lyndon Williams is a dedicated instructor and CISO of a top-level company. He uses his on-the-job knowledge to teach students how to use their new cybersecurity proficiency in real-world scenarios.This course will also prepare you for the CompTIA Security+ exam, which is an industry-standard certification, compliant with ISO 17024 standards, accredited by ANSI, and approved by the U.S. Department of Defense. If you're looking to advance your career, this certification is a great place to start. 96% of HR managers use IT certifications as screening or hiring criteria during recruitment.WHAT'S COVERED?The course covers all the CompTIA Security+ (SY0-701) objective domains:General Security Concepts - 12%Threats, Vulnerabilities, and Mitigations - 22%Security Architecture - 18%Security Operations - 28%Security Program Management and Oversight - 20%EXAM INFOExam code: SY0-701Max. 90 questions (performance-based and multiple choice)Length of exam: 90 minutesPassing score: 750 (on a scale of 100-900)Exam voucher cost: $392 USD (be sure to go to Total Seminars' website for discount vouchers!)Recommended experience: CompTIA Network+ and two years of experience working in a security/ systems administrator job roleTesting provider: Pearson VUE (in-person and online at-home options available)HOW DO I TAKE THE COMPTIA SECURITY+ EXAM?Buy an exam voucher (get your discount voucher at Total Seminars' website), schedule your exam on the Pearson VUE website, and then take the exam at a qualifying Pearson VUE testing center or virtually using their OnVue option.Schedule through a testing center: pearsonvue. comSchedule an at-home (or at-work) exam: onvue. comWHAT KIND OF JOB CAN I GET WITH A COMPTIA SECURITY+ CERTIFICATION?Security or systems administratorSecurity engineer/analystSecurity IT auditorIT project managerBeginner cybersecurity specialistJunior IT auditorJunior penetration tester
Overview
Section 1: Chapter 0 - About Security+
Lecture 1 Introduction to the CompTIA Security+ (SY0-701) Exam Prep Course
Lecture 2 About the CompTIA Security+ (SY0-701) Exam
Lecture 3 How to Take Your CompTIA Security+ (SY0-701) Exam
Section 2: Chapter 1 - Risk Management
Lecture 4 Defining Business Risk
Lecture 5 Threat Actors, Part 1
Lecture 6 Threat Actors, Part 2
Lecture 7 Threat Intelligence
Lecture 8 Risk Management Concepts
Lecture 9 Security Controls
Lecture 10 Risk Assessments and Treatments
Lecture 11 Quantitative Risk Assessments
Lecture 12 Qualitative Risk Assessments
Lecture 13 Security and the Information Life Cycle
Lecture 14 Data Destruction
Lecture 15 Chapter 1 Exam Question Review
Lecture 16 Wiping Disks with the dd Command Lab
Lecture 17 Chapter 1 Ask Me Anything (AMA)
Section 3: Chapter 2 - Foundations of Cryptography
Lecture 18 Cryptography Basics
Lecture 19 Hashing
Lecture 20 Cryptographic Attacks
Lecture 21 Password Cracking
Lecture 22 Password Cracking Demo
Lecture 23 Chapter 2 Exam Question Review
Lecture 24 SSH Public Key Authentication Lab
Lecture 25 Chapter 2 Ask Me Anything (AMA)
Section 4: Chapter 3 - Physical Security
Lecture 26 Physical Security Overview
Lecture 27 Physical Security
Lecture 28 Keylogger Demo
Lecture 29 Environmental Controls
Lecture 30 Chapter 3 Exam Question Review
Lecture 31 Physical Security Lab
Lecture 32 Chapter 3 Ask Me Anything (AMA)
Section 5: Chapter 4 - Identity and Account Management
Lecture 33 Identification, Authentication, and Authorization
Lecture 34 Enabling Multifactor Authentication
Lecture 35 Authorization
Lecture 36 Accounting
Lecture 37 Authentication Methods
Lecture 38 Access Control Schemes
Lecture 39 Account Management
Lecture 40 Network Authentication
Lecture 41 Identity Management Systems
Lecture 42 Chapter 4 Exam Question Review
Lecture 43 Creating Linux Users and Groups Lab
Lecture 44 Chapter 4 Ask Me Anything (AMA)
Section 6: Chapter 5 - Tools of the Trade
Lecture 45 Touring the CLI
Lecture 46 Shells
Lecture 47 The Windows Command Line
Lecture 48 Microsoft PowerShell
Lecture 49 Linux Shells
Lecture 50 Network Scanners
Lecture 51 Network Scanning with Nmap
Lecture 52 Network Protocol Analyzers
Lecture 53 Using Wireshark to Analyze Network Traffic
Lecture 54 Using tcpdump to Analyze Network Traffic
Lecture 55 Log Files
Lecture 56 Centralized Logging
Lecture 57 Cybersecurity Benchmark Tools
Lecture 58 Configuring Linux Log Forwarding
Lecture 59 Chapter 5 Exam Question Review
Lecture 60 Linux Shell Script Lab
Lecture 61 Nmap Lab
Lecture 62 Chapter 5 Ask Me Anything (AMA)
Section 7: Chapter 6 - Securing Individual Systems
Lecture 63 Malware
Lecture 64 Weak Configurations
Lecture 65 Common Attacks
Lecture 66 Overflow Attacks
Lecture 67 Password Attacks
Lecture 68 Bots and Botnets
Lecture 69 Disk RAID Levels
Lecture 70 Securing Hardware
Lecture 71 Securing Endpoints
Lecture 72 Securing Data with Encryption
Lecture 73 Chapter 6 Exam Question Review
Lecture 74 Linux Software RAID Lab
Lecture 75 Secure Enclave Lab in macOS
Lecture 76 Chapter 6 Ask Me Anything (AMA)
Section 8: Chapter 7 - Securing The Basic LAN
Lecture 77 Data Protection
Lecture 78 Cryptographic Methods
Lecture 79 Symmetric Cryptosystems
Lecture 80 Symmetric Block Modes
Lecture 81 Asymmetric Cryptosystems
Lecture 82 Understanding Digital Certificates
Lecture 83 Trust Models
Lecture 84 Public Key Infrastructure
Lecture 85 Certificate Types
Lecture 86 Touring Certificates
Lecture 87 Network Architecture Planning
Lecture 88 The OSI Model
Lecture 89 ARP Cache Poisoning
Lecture 90 Other Layer 2 Attacks
Lecture 91 Network Planning
Lecture 92 Zero Trust Network Access (ZTNA) 2.0
Lecture 93 Load Balancing
Lecture 94 Securing Network Access
Lecture 95 Honeypots
Lecture 96 Static and Dynamic Code Analysis
Lecture 97 Firewalls
Lecture 98 Proxy Servers
Lecture 99 Web Filtering
Lecture 100 Network and Port Address Translation
Lecture 101 IP Security (IPsec)
Lecture 102 SD-WAN and SASE
Lecture 103 Virtual Private Networks (VPNs)
Lecture 104 Intrusion Detection and Prevention Systems (IDS/IPS)
Lecture 105 Chapter 7 Exam Question Review
Lecture 106 Linux Snort IDS Lab
Lecture 107 Chapter 7 Ask Me Anything (AMA)
Section 9: Chapter 8 - Securing Wireless LANs
Lecture 108 Wi-Fi Encryption Standards
Lecture 109 RFID, NFC, and Bluetooth
Lecture 110 Wi-Fi Coverage and Performance
Lecture 111 Wi-Fi Discovery and Attacks
Lecture 112 Cracking WPA2
Lecture 113 Wi-Fi Hardening
Lecture 114 Chapter 8 Exam Question Review
Lecture 115 WPA2 Cracking Lab
Lecture 116 Chapter 8 Ask Me Anything (AMA)
Section 10: Chapter 9 - Securing Virtual and Cloud Environments
Lecture 117 Defending a Public Server
Lecture 118 Common Attacks and Mitigations
Lecture 119 DDoS Attacks in the Real World
Lecture 120 Containers and Software-Defined Networking
Lecture 121 Hypervisors and Virtual Machines
Lecture 122 Cloud Deployment Models
Lecture 123 Cloud Service Models
Lecture 124 Securing the Cloud
Lecture 125 Chapter 9 Exam Question Review
Lecture 126 Docker Container Lab
Lecture 127 Chapter 9 Ask Me Anything (AMA)
Section 11: Chapter 10 -Securing Dedicated and Mobile Systems
Lecture 128 Industrial Control System (ICS)
Lecture 129 Internet of Things (IoT) Devices
Lecture 130 Connecting to Dedicated and Mobile Systems
Lecture 131 Security Constraints for Dedicated Systems
Lecture 132 Mobile Device Deployment and Hardening
Lecture 133 Chapter 10 Exam Question Review
Lecture 134 Smartphone Hardening Lab
Lecture 135 Embedded Systems
Lecture 136 Chapter 10 Ask Me Anything (AMA)
Section 12: Chapter 11 - Secure Protocols and Applications
Lecture 137 DNS Security
Lecture 138 FTP Packet Capture
Lecture 139 Secure Web and E-mail
Lecture 140 Request Forgery Attacks
Lecture 141 Cross-Site Scripting Attacks
Lecture 142 Web Application Security
Lecture 143 OWASP Top 10
Lecture 144 Web App Vulnerability Scanning
Lecture 145 Chapter 11 Exam Question Review
Lecture 146 OWASP ZAP Web App Scan Lab
Lecture 147 Chapter 11 Ask Me Anything (AMA)
Section 13: Chapter 12 - Testing Infrastructure
Lecture 148 Testing Infrastructure Overview
Lecture 149 Social Engineering Attacks
Lecture 150 Vulnerability Assessments
Lecture 151 Penetration Testing
Lecture 152 The Metasploit Framework
Lecture 153 Chapter 12 Exam Question Review
Lecture 154 Chapter 12 Ask Me Anything (AMA)
Section 14: Chapter 13 - Business Security Impact
Lecture 155 Introduction to Business Security
Lecture 156 Business Impact Analysis
Lecture 157 Data Types and Roles
Lecture 158 Personnel Risk and Policies
Lecture 159 Attestation
Lecture 160 Internal Audits and Assessments
Lecture 161 External Audits and Assessments
Lecture 162 Third-Party Risk Management
Lecture 163 Agreement Types
Lecture 164 Change Management
Lecture 165 Technical Change Management
Lecture 166 What Is Automation and Orchestration?
Lecture 167 Benefits of Automation and Orchestration
Lecture 168 Use Cases of Automation and Orchestration
Lecture 169 Other Considerations of Automation and Orchestration
Lecture 170 Putting It All Together
Lecture 171 Exploring the NIST Frameworks
Section 15: Chapter 14 - Dealing with Incidents
Lecture 172 Incident Response Overview
Lecture 173 Incident Response Plans (IRPs)
Lecture 174 IRP Testing
Lecture 175 Threat Analysis and Mitigating Actions
Lecture 176 Digital Forensics
Lecture 177 Business Continuity and Alternate Sites
Lecture 178 Data Backup
Lecture 179 Chapter 14 Exam Question Review
Lecture 180 Autopsy Forensic Browser Lab
Lecture 181 Chapter 14 Ask Me Anything (AMA)
Section 16: Practice Exam
Section 17: Bonus Lecture
Lecture 182 Bonus Video
This course is intended for anyone who is preparing for an introductory-level cybersecurity position or looking to improve their security skills and become CompTIA Security+ certified.