Video description
Your guide to prepare and clear the CompTIA Security+ Certification SY0-601 exam
About This Video
- Understand the various risk management concepts
- Learn the various cryptographic methods used to protect the critical keys in cryptography
- Understand the Diffie-Hellman key exchange agreement and methods
In Detail
Excel in the CompTIA Security+ Certification SY0-601 exam by taking this course, which deep dives into the various concepts of risk management and kinds of risk involved, and the various security standards such as PCI DSS and the Cloud Controls Matrix (CCM) define what types of security controls to put in place to mitigate risk, both on-premises and in the cloud.
Learn about data protection and the various cryptographic methods used to protect the critical keys in cryptography that keep communication secure. The course also reviews different types of certificates including web, email, code-signing, machine/computer, and user. Explore the 3 As—authentication, authorization, and accounting/auditing, which play a big role in IT security.
Tracking activity through auditing provides accountability for access to resources such as files on a file server or database rows. Learn about securing dedicated systems using IoT. IoT devices are function-specific and can communicate over the Internet. Examples include environmental control devices, medical devices, and video surveillance systems. This episode also covers the Zigbee smart home automation protocol.
Wrap up the course by understanding data backup; backing up data provides availability in the event of data deletion, corruption, or encryption through ransomware. This episode discusses backup settings such as compression and encryption, as well as full, differential, and incremental backup types.
Who this book is for
This course is intended for anyone that is preparing for an IT security position or looking to improve their security skills and become CompTIA Security+ Certified. However, it goes beyond that and will give you the skills you need to be a better security tech on the job.
Publisher resources
Table of contents
-
Chapter 1 : Risk Management
- Promo
- Introduction
- About the Security+ (SY0-601) Exam
- Defining Risk
- Threats and Vulnerabilities
- Threat Intelligence
- Risk Management Concepts
- Security Controls
- Risk Assessments and Treatments
- Quantitative Risk Assessments
- Qualitative Risk Assessments
- Business Impact Analysis
- Data Types and Roles
- Security and the Information Life Cycle
- Data Destruction
- Personnel Risk and Policies
- Third-Party Risk Management
- Agreement Types
- Chapter 1 Exam Question Review
- Wiping Disks with the dd Command Lab
- Chapter 1 Ask Me Anything (AMA)
-
Chapter 2 : Cryptography
- Cryptography Basics
- Data Protection
- Cryptographic Methods
- Symmetric Cryptosystems
- Symmetric Block Modes
- Asymmetric Cryptosystems
- Diffie-Hellman
- Hashing
- Understanding Digital Certificates
- Trust Models
- Public Key Infrastructure
- Certificate Types
- Touring Certificates
- Cryptographic Attacks
- Password Cracking
- Password Cracking Demo
- Chapter 2 Exam Question Review
- SSH Public Key Authentication Lab
- Chapter 2 Ask Me Anything (AMA)
-
Chapter 3 : Identity and Account Management
- Identification, Authentication, and Authorization
- Enabling Multifactor Authentication
- Authorization
- Accounting
- Authentication Methods
- Access Control Schemes
- Account Management
- Network Authentication
- Identity Management Systems
- Chapter 3 Exam Question Review
- Creating Linux Users and Groups Lab
- Chapter 3 Ask Me Anything (AMA)
-
Chapter 4 : Tools of the Trade
- Touring the CLI
- Shells
- The Windows Command Line
- Microsoft PowerShell
- Linux Shells
- Python Scripts
- Windows Command-Line Tools
- Linux Command-Line Tools
- Network Scanners
- Network Scanning with Nmap
- Network Protocol Analyzers
- Using Wireshark to Analyze Network Traffic
- Using tcpdump to Analyze Network Traffic
- Log Files
- Centralized Logging
- Configuring Linux Log Forwarding
- Chapter 4 Exam Question Review
- Linux Shell Script Lab
- Nmap Lab
- Chapter 4 Ask Me Anything (AMA)
- Chapter 5 : Securing Individual Systems
-
Chapter 6 : The Basic LAN
- The OSI Model
- ARP Cache Poisoning
- Other Layer 2 Attacks
- Network Planning
- Load Balancing
- Securing Network Access
- Honeypots
- Firewalls
- Proxy Servers
- Network and Port Address Translation
- IP Security (IPsec)
- Virtual Private Networks (VPNs)
- Intrusion Detection and Prevention Systems (IDS/IPS)
- Chapter 6 Exam Question Review
- Linux Snort IDS Lab
- Chapter 6 Ask Me Anything (AMA)
- Chapter 7 : Securing Wireless LANs
- Chapter 8 : Securing Public Servers
- Chapter 9 : Securing Dedicated Systems
- Chapter 10 : Physical Security
- Chapter 11 : Securing Dedicated Systems
- Chapter 12 : Testing Infrastructure
- Chapter 13 : Dealing with Incidents
Product information
- Title: CompTIA Security+ Certification SY0-601: The Total Course
- Author(s):
- Release date: October 2021
- Publisher(s): Packt Publishing
- ISBN: 9781803231853
You might also like
video
Python Fundamentals
51+ hours of video instruction. Overview The professional programmer’s Deitel® video guide to Python development with …
book
Clean Code: A Handbook of Agile Software Craftsmanship
Even bad code can function. But if code isn't clean, it can bring a development organization …
book
Head First Design Patterns, 2nd Edition
You know you don’t want to reinvent the wheel, so you look to design patterns—the lessons …
book
Building Microservices, 2nd Edition
Distributed systems have become more fine-grained as organizations shift from code-heavy monolithic applications to smaller, self-contained …