O'Reilly logo

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

CompTIA Security+ (2011 Objectives)

Video Description

The CompTIA Security+ Certification is the entrylevel certification of choice for information security professionals. The exam includes network, compliance, operational, application, data, and host security. It also covers threats and vulnerabilities, access control, identity management, and cryptography. This course, led by security expert Mike Chapple, provides you with the foundation of knowledge you will need to pass the CompTIA Security+ exam. To begin learning today, simply click on the links.

Table of Contents

  1. Introduction
    1. About this Course 00:02:29
    2. CIA Triad 00:04:40
    3. Security Basics 00:05:15
  2. Networking
    1. TCP/IP Networking 00:05:53
    2. IP Addressing 00:09:03
    3. Ports 00:04:00
    4. Domain Name Service 00:07:20
    5. Network Address Translation 00:03:19
    6. Routers & Switches 00:04:18
    7. Virtual LANs 00:04:00
    8. Routing & Switching Security 00:03:49
    9. Network Access Control 00:04:03
  3. Network Security Devices
    1. Firewalls 00:05:37
    2. Firewall Rule Management 00:06:30
    3. Intrusion Detection & Prevention 00:05:24
    4. Web Security Devices 00:05:44
    5. Load Balancing 00:04:59
    6. Proxies 00:04:36
    7. Virtual Private Networks 00:04:34
  4. Network Security Techniques
    1. Sniffers & Protocol Analyzers 00:06:09
    2. Simple Network Management Protocol 00:03:29
    3. Content Filtering 00:07:23
    4. Virtualization 00:06:32
    5. Cloud Computing 00:04:43
    6. Telephony Security 00:07:07
    7. Wireless Networking 00:06:01
    8. Wireless Security 00:06:38
  5. Security Policies & Awareness
    1. Security Policies 00:06:10
    2. Information Classification 00:05:31
    3. Information Handling 00:03:10
    4. Information Disposal 00:04:43
    5. Business Practices 00:03:59
    6. Security Awareness Training 00:04:19
  6. Risk Management
    1. Risk Assessment 00:06:25
    2. Risk Management 00:04:54
    3. Implementing Controls 00:03:52
    4. Reviews & Audits 00:06:17
    5. Change Management 00:05:05
    6. Compliance 00:04:25
    7. Social Networking & P2P 00:04:44
    8. Threat Awareness 00:05:45
  7. Incident Response
    1. Incident Response Process 00:05:24
    2. System Forensics 00:04:54
    3. Network Forensics 00:06:22
    4. Physical Forensics 00:03:30
  8. Disaster Recovery & Business Continuity
    1. Business Continuity 00:05:27
    2. Disaster Recovery 00:04:22
    3. Data Backups 00:05:02
    4. Redundancy & Fault Tolerance 00:08:42
    5. Environmental Controls 00:07:08
  9. Threats & Vulnerabilities
    1. Malware 00:05:30
    2. Social Engineering 00:03:07
    3. Network Attacks 00:03:24
    4. Host-based Attacks 00:03:46
    5. Cookies & Session Hijacking 00:03:32
  10. Vulnerability Management
    1. Vulnerability Scanning 00:04:12
    2. Penetration Testing 00:03:27
    3. Honeypots & Honeynets 00:03:12
  11. Application Security
    1. Application Security 00:04:37
    2. Secure Coding 00:05:54
    3. Cross-Site Scripting Attacks 00:05:06
    4. Cross-Site Request Forgery Attacks 00:04:07
    5. Injection Attacks 00:05:58
  12. Host Security
    1. Operating System Security 00:05:19
    2. Host Firewalls 00:06:38
    3. Patch Management 00:03:53
    4. Anti-Malware Techniques 00:04:15
    5. Mobile Device Security 00:05:23
    6. Data Loss Prevention 00:06:06
  13. Access Control & Identity Management
    1. Physical Security 00:07:05
    2. Authentication & Authorization 00:04:16
    3. Password Security 00:06:20
    4. Multifactor Authentication 00:05:40
    5. Single Sign On 00:03:27
    6. Kerberos 00:05:53
    7. Access Controls 00:05:38
    8. Account Management 00:03:28
  14. Cryptography
    1. Cryptography 00:03:55
    2. Encryption & Decryption 00:07:12
    3. Symmetric Cryptography 00:06:12
    4. Asymmetric Cryptography 00:06:38
    5. Hashing 00:04:04
    6. Digital Signatures 00:05:58
    7. Digital Certificates 00:06:03
    8. Transport Encryption 00:05:12
    9. IPSec 00:05:16
    10. Portable Device Encryption 00:03:28
  15. Conclusion
    1. Wrap-Up 00:03:32
  16. Credits
    1. About this Author 00:00:55