Video description
The CompTIA Security+ Exam Prep will be targeted towards both new learners and professionals. One of the major issues within the cybersecurity realm is that IT professionals are not able to identify both internal and external threats that are affecting their organization. By completing this video series, you will be able to understand the baseline of IT security practices, policies, tools, types of attacks, and vulnerabilities, and how to prevent and mitigate those threats. This video series also prepares you for the official CompTIA Security+ SY0-501 certification.
Table of contents
- Chapter 1: Fundamentals of Information Technology
-
Chapter 2: Threats, Attacks, and Vulnerabilities
- Introduction
- Identifying Indicators of Compromise (IoC)
- Comparing Different Types of Attacks – Social Engineering
- Comparing Different Types of Attacks – Application Attacks
- Comparing Different Types of Attacks – Wireless Attacks
- Comparing Different Types of Attacks – Cryptographic Attacks
- Understanding Threat Actors
- Understanding the Need for Penetration Testing
- Learning About the Concepts of Vulnerability Scanning
- Types of Vulnerabilities
-
Chapter 3: Technologies Tools
- Introduction
- Network Security Components – Firewalls and VPN
- Network Security Components – Network Devices
- Network Security Components – Proxies and Load Balancers
- Network Security Components – Wireless Devices
- Network Security Components – Other Security Devices
- Using Security Tools to Assess Security Posture – Software Tools
- Using Security Tools to Assess Security Posture – CLI Tools
- Understanding Common Security Issues
- Understanding Security Technologies
- Securing Mobile Devices - Connection
- Securing Mobile Devices - Management
- Securing Mobile Devices - Enforcement
- Securing Mobile Devices - Deployment
- Implementing Secure Protocols
-
Chapter 4: Architecture Design
- Introduction
- Understanding Frameworks and Best Practices
- Secure Configuration
- Secure Network Architecture – Zones Topologies
- Secure Network Architecture – Network Segmentation
- Secure Network Architecture – VPN
- Secure Network Architecture – Device Placement
- Implementing Secure Systems – Hardware Firmware Security
- Implementing Secure Systems – Operating System Security
- Implementing Secure Systems – Peripherals
- Understanding the Importance of Secure Staging Concepts
- Understanding Security Issues with Embedded Systems
- Secure Application Development – Life Cycle Models
- Secure Application Development – Version Control, Change Management, and Provisioning
- Secure Application Development – Secure Coding Concepts
- Secure Application Development – Code Quality and Testing
- Security in Cloud and Virtualization Concepts
- Understanding Resiliency and Automation Strategies to Reduce Risk
- Implementing Physical Security Controls
- Chapter 5: Identity Access Management
-
Chapter 6: Risk Management
- Introduction
- Understanding the Importance of Policies, Plans, and Procedures – Part 1
- Understanding the Importance of Policies, Plans, and Procedures – Part 2
- Understanding the Importance of Policies, Plans, and Procedures – Part 3
- Business Impact Analysis Concepts
- Risk Management Processes
- Incident Response Procedures – Part 1
- Incident Response Procedures – Part 2
- Building and Planning Effective Business Continuity Plans
- Computer Forensics Concepts – Part 1
- Computer Forensics Concepts – Part 2
- Understanding Disaster Recovery and Continuity of Operations – Part 1
- Understanding Disaster Recovery and Continuity of Operations – Part 2
- Understanding Types of Controls
- Data Security and Privacy Practices
-
Chapter 7: Cryptography PKI
- Introduction
- Understanding the Concepts of Cryptography – Part 1
- Understanding the Concepts of Cryptography – Part 2
- Understanding the Concepts of Cryptography – Part 3
- Describing the Characteristics of Cryptography Algorithms – Part 1
- Describing the Characteristics of Cryptography Algorithms – Part 2
- Implementing Wireless Security
- Understanding Public Key Infrastructure (PKI) – Part 1
- Understanding Public Key Infrastructure (PKI) – Part 2
Product information
- Title: CompTIA Security+ Exam Prep
- Author(s):
- Release date: September 2020
- Publisher(s): EC-Council
- ISBN: None
You might also like
video
CompTIA Security+ Certification (SY0-501)
CompTIA Security+ meets the ISO 17024 standard and is approved by U.S. Department of Defense to …
book
Cisco Certified CyberOps Associate 200-201 Certification Guide
Begin a successful career in cybersecurity operations by achieving Cisco Certified CyberOps Associate 200-201 certification Key …
video
CompTIA Security+ (SY0-501)
An updated edition of this video title is available. Please go to CompTIA Security+ SY0-601 Complete …
video
Securing Your Network from Attacks
Attacks on enterprise networks and home networks are a growing problem with daily targeted attacks that …