CompTIA Security+ Certification SY0-501: The Total Course

Video description

Everything you need to pass the CompTIA Security+ SY0-501 Exam

About This Video

  • Learn risk management, cryptography and lots more skills to be a great IT security tech.
  • A complete course designed to pass the exam to become CompTIA Security+ certified.

In Detail

Welcome to the CompTIA Security+ Certification; SY0-501. The Total Course from Mike Meyers and Total Seminars.

This course covers everything you need to know to pass your CompTIA Security+ Certification SY0-501 exam. The first goal of the course is to make you a good IT security tech and, in the process, make sure you are ready to pass the CompTIA Security+ exam.

Publisher resources

Download Example Code

Table of contents

  1. Chapter 1 : Risk Management
    1. Introduction to the CompTIA Security+ Exam SY0-501
    2. The CIA of Security
    3. Threat Actors
    4. What is Risk?
    5. Managing Risk
    6. Using Guides for Risk Assessment
    7. Security Controls
    8. Interesting Security Controls
    9. Defense in Depth
    10. IT Security Governance
    11. Security Policies
    12. Frameworks
    13. Quantitative Risk Calculations
    14. Business Impact Analysis
    15. Organizing Data
    16. Security Training
    17. Third Party Agreements
  2. Chapter 2 : Cryptography
    1. Cryptography Basics
    2. Cryptographic Methods
    3. Symmetric Cryptosystems
    4. Symmetric Block Modes
    5. RSA Cryptosystems
    6. Diffie-Hellman
    7. PGP/GPG
    8. Hashing
    9. HMAC
    10. Steganography
    11. Certificates and Trust
    12. Public Key Infrastructure
    13. Cryptographic Attacks
  3. Chapter 3 : Identity and Access Management
    1. Identification
    2. Authorization Concepts
    3. Access Control List
    4. Password Security
    5. Linux File Permissions
    6. Windows File Permissions
    7. User Account Management
    8. AAA
    9. Authentication Methods
    10. Single Sign-On
  4. Chapter 4 : Tools of the Trade
    1. OS Utilities, Part 1
    2. OS Utilities, Part 2
    3. Network Scanners
    4. Protocol Analyzers
    5. SNMP
    6. Logs
  5. Chapter 5 : Securing Individual Systems
    1. Denial of Service
    2. Host Threats
    3. Man-in-the-Middle
    4. System Resiliency
    5. RAID
    6. NAS and SAN
    7. Physical Hardening
    8. RFI, EMI and ESD
    9. Host Hardening
    10. Data and System Security
    11. Disk Encryption
    12. Hardware/Firmware Security
    13. Secure OS Types
    14. Securing Peripherals
    15. Malware
    16. Analyzing Output
    17. IDS and IPS
    18. Automation Strategies
    19. Data Destruction
  6. Chapter 6 : The Basic LAN
    1. LAN Review
    2. Network Topologies Review
    3. Network Zone Review
    4. Network Access Controls
    5. The Network Firewall
    6. Proxy Servers
    7. Honeypots
    8. Virtual Private Networks
    9. IPSec
    10. NIDS/NIPS
    11. SIEM
  7. Chapter 7 : Beyond the Basic LAN
    1. Wireless Review
    2. Living in Open Networks
    3. Vulnerabilities with Wireless Access Points
    4. Cracking 802.11 - WEP
    5. Cracking 802.11 - WPA
    6. Cracking 802.11 - WPS
    7. Wireless Hardening
    8. Wireless Access Points
    9. Virtualization Basics
    10. Virtual Security
    11. Containers
    12. IaaS
    13. PaaS
    14. SaaS
    15. Deployment Models
    16. Static Hosts
    17. Mobile Connectivity
    18. Deploying Mobile Devices
    19. Mobile Enforcement
    20. Mobile Device Management
    21. Physical Controls
    22. HVAC
    23. Fire Suppression
  8. Chapter 8 : Secure Protocols
    1. Secure Applications and Protocols
    2. Network Models
    3. Know Your Protocols - TCP/IP
    4. Know Your Protocols - Applications
    5. Transport Layer Security (TLS)
    6. Internet Service Hardening
    7. Protecting Your Servers
    8. Secure Code Development
    9. Secure Deployment Concepts
    10. Code Quality and Testing
  9. Chapter 9 : Testing Your Infrastructure
    1. Vulnerability Scanning Tools
    2. Vulnerability Scanning Assessment
    3. Social Engineering Principles
    4. Social Engineering Attacks
    5. Attacking Web Sites
    6. Attacking Applications
    7. Exploiting a Target
    8. Vulnerability Impact
  10. Chapter 10 : Dealing with Incidents
    1. Incident Response
    2. Digital Forensics
    3. Contingency Planning
    4. Backups

Product information

  • Title: CompTIA Security+ Certification SY0-501: The Total Course
  • Author(s): Total Seminars, Mike Meyers
  • Release date: August 2019
  • Publisher(s): Packt Publishing
  • ISBN: 9781839214639