Video description
Excel in the CompTIA Security+ Certification SY0-601 exam by taking this course, which deep dives into the various concepts of risk management and kinds of risk involved, and the various security standards such as PCI DSS and the Cloud Controls Matrix (CCM) define what types of security controls to put in place to mitigate risk, both on-premises and in the cloud.
Learn about data protection and the various cryptographic methods used to protect the critical keys in cryptography that keep communication secure. The course also reviews different types of certificates including web, email, code-signing, machine/computer, and user. Explore the 3 As—authentication, authorization, and accounting/auditing, which play a big role in IT security.
Tracking activity through auditing provides accountability for access to resources such as files on a file server or database rows. Learn about securing dedicated systems using IoT. IoT devices are function-specific and can communicate over the Internet. Examples include environmental control devices, medical devices, and video surveillance systems. This episode also covers the Zigbee smart home automation protocol.
Wrap up the course by understanding data backup; backing up data provides availability in the event of data deletion, corruption, or encryption through ransomware. This episode discusses backup settings such as compression and encryption, as well as full, differential, and incremental backup types.
What You Will Learn
- Understand about risk management, threats, and vulnerabilities
- Learn the basics of cryptography and the various cryptographic methods
- Learn about Identity and account management
- Learn about network authentication
- Learn about malware and the various kinds of attacks on the system
- Learn about mobile device deployment and hardening
Audience
This course is intended for anyone that is preparing for an IT security position or looking to improve their security skills and become CompTIA Security+ Certified. However, it goes beyond that and will give you the skills you need to be a better security tech on the job.
About The Authors
Mike Meyers: Total Seminars, LLC, is a provider of PC and network repair seminars and certification training services through books, videos, and courseware for thousands of organizations throughout the world including the United Nations, the FBI, and all branches of the US Department of Defense.
Mike Meyers is the president and co-founder of Total Seminars, which produces the best-selling CompTIA A+ and Network+ Certification books with over 1 million books in print. He is affectionately called the “Alpha Geek” and is the industry’s leading authority on CompTIA Certifications. He has created several other best-selling video courses on CompTIA certifications with the Total Seminars team of instructors.
Mike has been involved in the computer and network repair industry since 1987 as a technician, instructor, author, consultant, and speaker. He is the author of numerous popular PC books and videos, including the best-selling CompTIA A+ Certification All-In-One Exam Guide and CompTIA Network+ Certification All-In-One Exam Guide. His humorous and easy-to-follow approach to teaching comes through in his video training courses as well as his classroom instructor-led courses. Making IT concepts easy to understand and fun to learn helps students stay engaged and retain the information.
Daniel Lachance: Daniel Lachance, trainer, consultant, educator, and past programmer, has worked in the IT field since 1991. He is the owner of Lachance IT Consulting Inc. based in Halifax, Nova Scotia, Canada. Dan has worked in various capacities as a computer programmer, network and server consultant as well as an IT security auditor. He is also an experienced trainer, having delivered IT training online.
Publisher resources
Table of contents
-
Chapter 1 : Risk Management
- Promo
- Introduction
- About the Security+ (SY0-601) Exam
- Defining Risk
- Threats and Vulnerabilities
- Threat Intelligence
- Risk Management Concepts
- Security Controls
- Risk Assessments and Treatments
- Quantitative Risk Assessments
- Qualitative Risk Assessments
- Business Impact Analysis
- Data Types and Roles
- Security and the Information Life Cycle
- Data Destruction
- Personnel Risk and Policies
- Third-Party Risk Management
- Agreement Types
- Chapter 1 Exam Question Review
- Wiping Disks with the dd Command Lab
- Chapter 1 Ask Me Anything (AMA)
-
Chapter 2 : Cryptography
- Cryptography Basics
- Data Protection
- Cryptographic Methods
- Symmetric Cryptosystems
- Symmetric Block Modes
- Asymmetric Cryptosystems
- Diffie-Hellman
- Hashing
- Understanding Digital Certificates
- Trust Models
- Public Key Infrastructure
- Certificate Types
- Touring Certificates
- Cryptographic Attacks
- Password Cracking
- Password Cracking Demo
- Chapter 2 Exam Question Review
- SSH Public Key Authentication Lab
- Chapter 2 Ask Me Anything (AMA)
-
Chapter 3 : Identity and Account Management
- Identification, Authentication, and Authorization
- Enabling Multifactor Authentication
- Authorization
- Accounting
- Authentication Methods
- Access Control Schemes
- Account Management
- Network Authentication
- Identity Management Systems
- Chapter 3 Exam Question Review
- Creating Linux Users and Groups Lab
- Chapter 3 Ask Me Anything (AMA)
-
Chapter 4 : Tools of the Trade
- Touring the CLI
- Shells
- The Windows Command Line
- Microsoft PowerShell
- Linux Shells
- Python Scripts
- Windows Command-Line Tools
- Linux Command-Line Tools
- Network Scanners
- Network Scanning with Nmap
- Network Protocol Analyzers
- Using Wireshark to Analyze Network Traffic
- Using tcpdump to Analyze Network Traffic
- Log Files
- Centralized Logging
- Configuring Linux Log Forwarding
- Chapter 4 Exam Question Review
- Linux Shell Script Lab
- Nmap Lab
- Chapter 4 Ask Me Anything (AMA)
- Chapter 5 : Securing Individual Systems
-
Chapter 6 : The Basic LAN
- The OSI Model
- ARP Cache Poisoning
- Other Layer 2 Attacks
- Network Planning
- Load Balancing
- Securing Network Access
- Honeypots
- Firewalls
- Proxy Servers
- Network and Port Address Translation
- IP Security (IPsec)
- Virtual Private Networks (VPNs)
- Intrusion Detection and Prevention Systems (IDS/IPS)
- Chapter 6 Exam Question Review
- Linux Snort IDS Lab
- Chapter 6 Ask Me Anything (AMA)
- Chapter 7 : Securing Wireless LANs
- Chapter 8 : Securing Public Servers
- Chapter 9 : Securing Dedicated Systems
- Chapter 10 : Physical Security
- Chapter 11 : Securing Dedicated Systems
- Chapter 12 : Testing Infrastructure
- Chapter 13 : Dealing with Incidents
Product information
- Title: CompTIA Security+ Certification SY0-601: The Total Course
- Author(s):
- Release date: October 2021
- Publisher(s): Packt Publishing
- ISBN: 9781803231853
You might also like
video
Microsoft Power BI - The Complete Masterclass [2023 EDITION]
Microsoft Power BI is an interactive data visualization software primarily focusing on business intelligence, part of …
video
React.JS: The Complete Course for Beginners
React JS has taken center stage in easing the creation of dynamic user interfaces for websites …
video
Data Structures and Algorithms: The Complete Masterclass
With the knowledge of data structures and algorithms at your fingertips, you can write efficient computer …
video
Full Stack Web Development Mastery Course - Novice to Expert
Full stack development refers to the development of both frontend (client-side) and backend (server-side) portions of …