O'Reilly logo

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

CompTIA Security+ (SY0-501): Complete Course and Practice Exam

Video Description

CompTIA Security+ Bootcamp: Your preparation course for the most popular cyber security certification in the world!

About This Video

  • Passing the CompTIA Security+ certification exam with confidence
  • Understand computer security, its functions, and its components.

In Detail

This course is designed to help prepare you for the CompTIA Security+ (SY0-501) certification exam and covers the six domains for the Security+ (SY0-501) certification exam:

  • Threats, Attacks, and Vulnerabilities
  • Technologies and Tools
  • Architecture and Design
  • Identity and Access Management
  • Risk Management
  • Cryptography and PKI

You will learn the fundamentals of cybersecurity and gain experience in the configuration, management, and troubleshooting of common wired and wireless networks.

All the code files are placed at https://github.com/PacktPublishing/CompTIA-Security-SY0-501-Complete-Course-and-Practice-Exam

Table of Contents

  1. Chapter 1 : Overview of Security
    1. Welcome 00:04:26
    2. Overview of Security 00:02:59
    3. CIA Triad 00:03:58
    4. AAA of Security 00:03:09
    5. Security Threats 00:03:00
    6. Mitigating Threats 00:02:31
    7. Hackers 00:04:56
    8. Threat Actors 00:03:15
  2. Chapter 2 : Malware
    1. Malware 00:00:43
    2. Viruses 00:06:24
    3. Worms 00:02:13
    4. Trojans 00:02:52
    5. Demo: Viruses and Trojans 00:06:19
    6. Ransomware 00:02:33
    7. Spyware 00:02:42
    8. Rootkits 00:03:32
    9. Spam 00:02:59
    10. Summary of Malware 00:02:05
  3. Chapter 3 : Malware Infections
    1. Malware Infections 00:04:15
    2. Common Delivery Methods 00:04:30
    3. Demo: Phishing 00:05:22
    4. Botnets and Zombies 00:03:33
    5. Active Interception and Privilege Escalation 00:02:32
    6. Demo: Privilege Escalation 00:05:44
    7. Backdoors and Logic Bombs 00:03:51
    8. Symptoms of Infection 00:04:13
    9. Removing Malware 00:05:05
    10. Preventing Malware 00:05:59
  4. Chapter 4 : Security Applications and Devices
    1. Security Applications and Devices 00:00:36
    2. Software Firewalls 00:04:19
    3. Demo: Software Firewalls 00:06:48
    4. IDS 00:05:06
    5. Pop-up Blockers 00:03:12
    6. Data Loss Prevention (DLP) 00:03:46
    7. Securing the BIOS 00:03:59
    8. Securing Storage Devices 00:03:30
    9. Disk Encryption 00:04:54
  5. Chapter 5 : Mobile Device Security
    1. Mobile Device Security 00:01:17
    2. Securing Wireless Devices 00:01:33
    3. Mobile Malware 00:06:22
    4. SIM Cloning & ID Theft 00:04:04
    5. Bluetooth Attacks 00:02:11
    6. Mobile Device Theft 00:03:13
    7. Security of Apps 00:05:09
    8. BYOD 00:05:00
    9. Hardening Mobile Devices 00:03:55
  6. Chapter 6 : Hardening
    1. Hardening 00:01:51
    2. Unnecessary Applications 00:03:14
    3. Restricting Applications 00:02:59
    4. Demo: Unnecessary Services 00:05:38
    5. Trusted Operating System 00:02:00
    6. Updates and Patches 00:03:29
    7. Patch Management 00:03:52
    8. Group Policies 00:02:37
    9. Demo: Group Policies 00:04:09
    10. File Systems and Hard Drives 00:03:21
  7. Chapter 7 : Virtualization
    1. Virtualization 00:02:10
    2. Hypervisors 00:02:40
    3. Demo: How to create a VM 00:04:42
    4. Threats to VMs 00:03:46
    5. Securing VMs 00:03:50
    6. Demo: Securing VMs 00:04:44
  8. Chapter 8 : Application Security
    1. Application Security 00:01:46
    2. Web Browser Security 00:06:43
    3. Web Browser Concerns 00:03:22
    4. Demo: Web Browser Configuration 00:05:23
    5. Securing Applications 00:04:52
  9. Chapter 9 : Secure Software Development
    1. Software Development 00:08:38
    2. SDLC Principles 00:06:26
    3. Testing Methods 00:07:03
    4. Software Vulnerabilities and Exploits 00:03:47
    5. Buffer Overflows 00:06:18
    6. Demo: Buffer Overflow Attack 00:06:29
    7. XSS and XSRF 00:03:11
    8. SQL Injection 00:06:28
    9. Demo: SQL Injection 00:07:16
  10. Chapter 10 : Network Design
    1. Network Security 00:00:48
    2. The OSI Model 00:06:04
    3. Switches 00:03:36
    4. Routers 00:02:30
    5. Network Zones 00:03:29
    6. Network Access Control 00:02:43
    7. VLANs 00:01:33
    8. Subnetting 00:01:54
    9. Network Address Translation 00:02:30
    10. Telephony 00:06:01
  11. Chapter 11 : Perimeter Security
    1. Perimeter Security 00:00:50
    2. Firewalls 00:08:05
    3. Demo: SOHO Firewall 00:04:07
    4. Proxy Servers 00:04:15
    5. Honeypots and Honeynets 00:01:25
    6. Data Loss Prevention 00:01:38
    7. NIDS and NIPS 00:04:14
    8. Unified Threat Management 00:01:55
  12. Chapter 12 : Cloud Security
    1. Cloud Computing 00:03:32
    2. Cloud Types 00:02:55
    3. As a Service 00:07:07
    4. Cloud Security 00:02:28
    5. Defending Servers 00:04:35
  13. Chapter 13 : Network Attacks
    1. Network Attacks 00:00:41
    2. Ports and Protocols 00:04:27
    3. Memorization of Ports 00:11:34
    4. Unnecessary Ports 00:03:24
    5. Denial of Service 00:07:59
    6. DDoS 00:01:39
    7. Stopping a DDoS 00:02:30
    8. Spoofing 00:01:19
    9. Hijacking 00:03:48
    10. Replay Attack 00:01:30
    11. Demo: Null Sessions 00:02:27
    12. Transitive Attacks 00:01:28
    13. DNS Attacks 00:04:37
    14. ARP Poisoning 00:01:34
  14. Chapter 14 : Securing Networks
    1. Securing Networks 00:00:52
    2. Securing Network Devices 00:06:46
    3. Securing Network Media 00:08:51
    4. Securing WiFi Devices 00:04:25
    5. Wireless Encryption 00:05:34
    6. Wireless Access Points 00:06:15
    7. Wireless Attacks 00:04:19
    8. Demo: Wireless Attack 00:07:42
    9. Other Wireless Technologies 00:06:05
  15. Chapter 15 : Physical Security
    1. Physical Security 00:01:34
    2. Surveillance 00:02:54
    3. Door Locks 00:03:51
    4. Demo: Lock Picking 00:01:40
    5. Biometric Readers 00:04:18
  16. Chapter 16 : Facilities Security
    1. Facilities Security 00:00:40
    2. Fire Suppression 00:06:24
    3. HVAC 00:02:27
    4. Shielding 00:02:38
    5. Vehicles 00:02:06
  17. Chapter 17 : Authentication
    1. Authentication 00:05:57
    2. Authentication Models 00:05:21
    3. 802.1x 00:03:47
    4. LDAP and Kerberos 00:02:29
    5. Remote Desktop Services 00:01:54
    6. Remote Access Service 00:02:06
    7. VPN 00:03:05
    8. RADIUS vs TACACS+ 00:02:21
    9. Authentication Summary 00:02:07
  18. Chapter 18 : Access Control
    1. Access Control 00:00:53
    2. Access Control Models 00:08:17
    3. Best Practices 00:05:47
    4. Users and Groups 00:09:15
    5. Permissions 00:03:44
    6. Usernames and Passwords 00:02:39
    7. Demo: Policies 00:04:37
    8. User Account Control 00:01:57
  19. Chapter 19 : Risk Assessments
    1. Risk Assessments 00:08:37
    2. Qualitative Risk 00:04:09
    3. Quantitative Risk 00:05:31
    4. Methodologies 00:02:52
    5. Security Controls 00:06:52
    6. Vulnerability Management 00:07:53
    7. Penetration Testing 00:04:30
    8. OVAL 00:01:37
    9. Vulnerability Assessments 00:06:55
    10. Demo: Nmap Scanning 00:08:53
    11. Demo: Vulnerability Scanning 00:09:36
    12. Password Analysis 00:05:57
    13. Demo: Password Cracking 00:02:39
  20. Chapter 20 : Monitoring and Auditing
    1. Monitoring Types 00:02:57
    2. Performance Baselining 00:04:38
    3. Protocol Analyzers 00:03:01
    4. SNMP 00:03:44
    5. Demo: Analytical Tools 00:04:30
    6. Auditing 00:01:57
    7. Demo: Auditing Files 00:03:56
    8. Logging 00:03:43
    9. Log Files 00:05:17
    10. SIEM 00:02:57
  21. Chapter 21 : Cryptography
    1. Cryptography 00:04:59
    2. Symmetric vs Asymmetric 00:06:15
    3. Symmetric Algorithms 00:05:00
    4. Public Key Cryptography 00:03:12
    5. Asymmetric Algorithms 00:03:47
    6. Pretty Good Privacy 00:01:49
    7. Key Management 00:02:15
    8. One-Time Pad 00:04:22
    9. Demo: Steganography 00:03:54
    10. Hashing 00:08:31
    11. Demo: Hashing 00:03:07
    12. Hashing Attacks 00:03:18
    13. Increasing Hash Security 00:01:30
  22. Chapter 22 : Public Key Infrastructure
    1. Public Key Infrastructure 00:03:56
    2. Digital Certificates 00:06:46
    3. Demo: Certificates 00:03:34
    4. Certificate Authorities 00:04:16
    5. Web of Trust 00:02:38
  23. Chapter 23 : Security Protocols
    1. Security Protocols 00:00:24
    2. S/MIME 00:01:33
    3. SSL and TLS 00:05:51
    4. SSH 00:02:31
    5. VPN Protocols 00:06:41
    6. Demo: Setting up a VPN 00:01:37
  24. Chapter 24 : Planning for the Worst
    1. Planning for the Worst 00:02:13
    2. Redundant Power 00:03:11
    3. Backup Power 00:03:09
    4. Data Redundancy 00:04:42
    5. Demo: RAIDs 00:03:39
    6. Network Redundancy 00:02:07
    7. Server Redundancy 00:01:46
    8. Redundant Sites 00:02:23
    9. Data Backup 00:02:57
    10. Tape Rotation 00:03:56
    11. Disaster Recovery Plan 00:05:42
  25. Chapter 25 : Social Engineering
    1. Social Engineering 00:00:56
    2. Demo: Pretexting 00:04:18
    3. Insider Threat 00:02:13
    4. Phishing 00:01:16
    5. More Social Engineering 00:04:04
    6. User Education 00:04:40
  26. Chapter 26 : Policies and Procedures
    1. Policies and Procedures 00:05:56
    2. Data Classifications 00:06:45
    3. PII and PHI 00:06:23
    4. Security Policies 00:10:23
    5. User Education 00:04:05
    6. Vendor Relationships 00:07:55
    7. Disposal Policies 00:05:07
    8. Incident Response Procedures 00:04:39
    9. Data Collection Procedures 00:03:14
    10. Demo: Disk Imaging 00:06:59
    11. IT Security Frameworks 00:03:21
  27. Chapter 27 : Conclusion
    1. Conclusion 00:03:50
    2. Exam Tricks 00:04:13