CompTIA Security+ Certification (Exam SY0-401)

Video Description

Network and computer security used to be a high proiority, now security has become an absolute necessity. Understanding the fundamentals of network and computer security is a must in today's environment. CompTIA's Security+ certification is recognized around the world as validation that you know about the fundamental network and computer security practices and actions as well as the technologies involved. Earning the Security+ certification will open doors in the Information Technology workplace. In this course, Mark Long goes step-by-step to help you understand the various technologies and techniques to help you prepare for the CompTIA Security+ SY0-401 exam. Mark has been working in Information Technology for over 25 years and has worked in data security in the corporate environment and brings real-world knowledge to help you get ready for this exam.

Table of Contents

  1. Welcome/intro
    1. Welcome/intro 00:01:27
    2. Course Overview 00:04:12
    3. Why Security+ 00:06:18
  2. About the Exam
    1. What to Expect on the Exam 00:03:27
    2. How to Prepare 00:06:16
    3. How to Take the Exam 00:05:31
  3. Computer Security Basics
    1. Security Basics 00:05:15
    2. Security Threats 00:05:17
    3. Securing Computer Hardware 00:06:14
    4. Securing Storage Devices 00:06:44
    5. Security Removable Media 00:05:04
    6. Securing Storage Devices Demo 00:03:08
    7. Malicious Software pt. 1 00:06:16
    8. Malicious Software pt. 2 00:05:27
    9. Preventing Malicious Software 00:04:59
    10. Understanding Physical Security 00:06:47
    11. Hardware Disposal 00:03:46
  4. Network Design
    1. Network Security Basics 00:06:49
    2. Understanding Firewalls 00:03:38
    3. Firewall Operations 00:05:38
    4. Network Address Translation 00:06:06
    5. Switches 00:05:19
    6. Routers 00:05:44
    7. Network Security Devices 00:06:41
    8. Understanding VLANs 00:05:15
    9. Cloud Computing Basics 00:05:55
    10. Cloud Computing Types 00:06:26
    11. Security in the Cloud 00:06:12
    12. Securing Servers 00:06:18
  5. Network Protocols and Threats
    1. Network Protocol Basics 00:06:51
    2. Understanding Ports 00:05:20
    3. Common Ports 00:04:50
    4. Network Attacks pt. 1 00:06:26
    5. Network Attacks pt. 2 00:06:54
    6. Honeypots and Honeynets 00:06:10
    7. Intrusion Detection Systems 00:05:01
    8. NIDS and NIPS 00:06:54
    9. Unified Threat Management 00:04:20
  6. Access Control
    1. Access Control Basics 00:06:14
    2. Authentication and Authorization 00:04:55
    3. Users, Groups, and Permissions 00:06:10
    4. Authentication Services 00:06:51
    5. Usernames and Passwords 00:05:38
    6. Permissions Inheritance 00:05:59
    7. File and Folder Permissions 00:05:55
    8. Remote Authentication 00:05:02
  7. Securing Applications
    1. Application Security Basics 00:06:56
    2. Application Attacks 00:06:06
    3. Securing the Browser 00:06:59
    4. Preventing Application Attacks 00:04:37
  8. Monitoring and Auditing
    1. Monitoring Basics 00:05:19
    2. Monitoring Tools 00:05:54
    3. Network Monitor 00:05:52
    4. Auditing Basics 00:06:07
  9. OS Hardening
    1. What is System Hardening? 00:05:48
    2. Network Device Hardening 00:04:51
    3. Understanding Virtualization 00:06:00
    4. Virtual Machine Security 00:05:59
  10. Encryption
    1. Cryptography and Encryption 00:06:17
    2. Symmetric vs. Asymmetric 00:06:24
    3. Understanding Hashing pt. 1 00:06:06
    4. Understanding Hashing pt. 2 00:02:18
    5. Public Key Infrastructure pt. 1 00:06:01
    6. Public Key Infrastructure pt. 2 00:05:14
  11. Disaster Recovery
    1. Disaster Recovery Basics 00:05:21
    2. Redundancy Basics 00:04:52
    3. High Availability 00:06:13
    4. Redundancy Planning 00:05:08
    5. Fault Tolerance 00:04:19
    6. RAID Levels pt. 1 00:04:22
    7. RAID Levels pt. 2 00:05:19
  12. Risk Assessment and Vulnerability
    1. Dealing with Security Risks pt. 1 00:06:19
    2. Dealing with Security Risks pt. 2 00:03:46
    3. Risk Analysis Options 00:03:21
    4. Risk Mitigation 00:06:29
    5. Data Loss Preventions 00:03:39
    6. Third Party Risks 00:06:48
  13. The Three P's
    1. Policies, Procedures & People 00:04:38
    2. Data Classification 00:05:54
    3. Social Engineering pt. 1 00:06:10
    4. Social Engineering pt. 2 00:04:57
    5. Environmental Threats 00:06:06
    6. User Education 00:03:34
    7. Incident Response Procedures 00:06:16
  14. Course Wrap-Up
    1. Course Wrap-Up 00:04:22
  15. About the Author
    1. About the Author 00:03:42

Product Information

  • Title: CompTIA Security+ Certification (Exam SY0-401)
  • Author(s): VTC
  • Release date: March 2017
  • Publisher(s): Virtual Training Company, Inc.
  • ISBN: 9781618660329