CompTIA Security+ Certification; SY0-401. The Total Course

Video Description

Everything you need to pass the CompTIA Security+ SY0-401 Exam, from Mike Meyers. CompTIA expert and bestselling author.

About This Video

  • Topics include Risk management, Cryptography, Authentication and authorization.

  • Learn more on Host, LAN, and application security, Wireless, cloud and mobile security.

  • Learn also about Environmental and personnel security and controls.

  • In Detail

    The course covers all the CompTIA Security+ SY0-401 Objective Domains.

    Topics include: Risk management, Cryptography, Authentication and authorization, · Host, LAN, and application security, Wireless, cloud and mobile security., Environmental and personnel security and controls.

    This is a Total Security+ Course, it covers everything a good tech needs to know and prepares you to pass the CompTIA Security+ Certification exam.

    Table of Contents

    1. Chapter 1 : The CompTIA Security+ Exam
      1. Introduction to CompTIA Security+ Exam SY0-401 00:02:59
      2. The Security+ Exam basics 00:06:16
      3. Passing the Security+ Exam 00:04:34
    2. Chapter 2 : Stepping Up to IT Security
      1. The CIA of Security 00:03:47
      2. Security Controls 00:03:58
      3. Interesting Security Controls 00:04:05
      4. IT Security Governance 00:08:19
      5. Security Policies 00:08:18
      6. What is Risk? 00:09:53
      7. Managing Risk 00:11:58
      8. Quantitative Risk Calculations 00:08:11
    3. Chapter 3 : Core Security Concepts
      1. Cryptography Basics 00:10:20
      2. Hashing 00:07:16
      3. Hash-based Message Authentication Code – HMAC 00:03:47
      4. Symmetric Algorithms 00:11:45
      5. Asymmetric Algorithms 00:16:23
      6. Secure Applications and Protocols 00:10:55
      7. Steganography 00:05:38
      8. Certificates and Trust 00:14:15
      9. Public Key Infrastructure 00:20:49
    4. Chapter 4 : Authentication and Authorization
      1. Identification and Authentication 00:12:49
      2. Understanding Authorization 00:08:28
      3. Authentication Methods 00:09:50
      4. AAA 00:08:04
      5. Linux File Permissions 00:14:31
      6. Windows File Systems 00:15:19
      7. Single Sign On 00:10:09
      8. Password Security 00:09:14
      9. Account Issues 00:06:44
    5. Chapter 5 : Host Security
      1. Host Threats 00:09:01
      2. Malware 00:10:04
      3. Cryptographic Attacks 00:24:14
      4. Man-in-the-middle 00:22:13
      5. Denial of Service 00:08:34
      6. Host Hardening 00:16:17
      7. Network Models 00:06:57
      8. Know your protocols-TCP/IP 00:06:07
      9. Know your protocols-Applications 00:05:43
      10. Transport Layer Security – TLS 00:12:25
      11. IPsec 00:11:56
      12. NAS and SAN 00:16:02
      13. RAID Security 00:11:15
      14. Securing Data 00:04:22
      15. Disk Encryption 00:06:42
      16. Static Hosts 00:07:31
    6. Chapter 6 : LAN Security
      1. LAN Security Review 00:08:01
      2. Access Control Lists 00:04:51
      3. Proxy Servers 00:16:14
      4. IDS vs. IPS 00:04:29
      5. Network Access Control 00:10:31
      6. Virtual Private Networks 00:13:47
      7. SNMP 00:15:23
      8. Logs 00:11:11
    7. Chapter 7 : Application Security
      1. Attacking Applications 00:10:57
      2. Attacking Websites 00:07:56
      3. Hardening Web Servers 00:10:33
      4. Internet Service Hardening 00:06:43
      5. Virtualization Basics 00:07:16
      6. Virtual Security 00:15:02
    8. Chapter 8 : Wireless Security
      1. Wireless Review 00:09:44
      2. Living in Open Networks 00:09:41
      3. Fun with Access Points 00:07:01
      4. Cracking 802.11 Part 1 – WEP 00:11:58
      5. Cracking 802.11 Part 2 – WPA 00:09:41
      6. Cracking 802.11 Part 3 – WPS 00:09:50
      7. Wireless Hardening 00:14:04
    9. Chapter 9 : Physical Security
      1. RFI, EMI, ESD 00:03:13
      2. HVAC 00:07:26
      3. Fire Suppression 00:04:02
      4. Classifying Security Controls 00:06:09
      5. Physical Controls 00:08:44
    10. Chapter 10 : Outside Security
      1. Third Party Agreements 00:08:46
      2. Infrastructure as a Service (IaaS) 00:09:32
      3. Platform as a Service (PaaS) 00:09:04
      4. Software as a Service (SaaS) 00:02:39
      5. Deploying Mobile Devices 00:07:09
      6. Mobile Device Management 00:10:25
    11. Chapter 11 : People Security
      1. Social Engineering Principles 00:02:15
      2. Social Engineering Attacks 00:07:55
      3. Security Training 00:10:01
    12. Chapter 12 : Proactive Security
      1. Vulnerability Scanning Tools 00:09:24
      2. Vulnerability Assessment 00:04:43
      3. Penetration (Pen) Testing 00:11:21
      4. Incident Response 00:06:28
      5. Forensic Procedures 00:11:36
      6. Contingency Planning 00:10:10
      7. Backups 00:07:43

    Product Information

    • Title: CompTIA Security+ Certification; SY0-401. The Total Course
    • Author(s): Mike Meyers
    • Release date: June 2017
    • Publisher(s): Packt Publishing
    • ISBN: 9781788474139