Video description
The CompTIA Security+ Exam Prep will be targeted towards both new learners and professionals. One of the major issues within the cybersecurity realm is that IT professionals are not able to identify both internal and external threats that are affecting their organization. By completing this video series, you will be able to understand the baseline of IT security practices, policies, tools, types of attacks, and vulnerabilities, and how to prevent and mitigate those threats. This video series also prepares you for the official CompTIA Security+ SY0-501 certification.
Table of Contents
Chapter 1: Fundamentals of Information Technology
Course Overview
Introduction
Safety and Professionalism
Essentials of Computing
Types of RAM
Fundamentals of Motherboards
Power Supply Unit
Mass Storage Devices
Chapter 2: Threats, Attacks, and Vulnerabilities
Introduction
Identifying Indicators of Compromise (IoC)
Comparing Different Types of Attacks – Social Engineering
Comparing Different Types of Attacks – Application Attacks
Comparing Different Types of Attacks – Wireless Attacks
Comparing Different Types of Attacks – Cryptographic Attacks
Understanding Threat Actors
Understanding the Need for Penetration Testing
Learning About the Concepts of Vulnerability Scanning
Types of Vulnerabilities
Chapter 3: Technologies Tools
Introduction
Network Security Components – Firewalls and VPN
Network Security Components – Network Devices
Network Security Components – Proxies and Load Balancers
Network Security Components – Wireless Devices
Network Security Components – Other Security Devices
Using Security Tools to Assess Security Posture – Software Tools
Using Security Tools to Assess Security Posture – CLI Tools
Understanding Common Security Issues
Understanding Security Technologies
Securing Mobile Devices - Connection
Securing Mobile Devices - Management
Securing Mobile Devices - Enforcement
Securing Mobile Devices - Deployment
Implementing Secure Protocols
Chapter 4: Architecture Design
Introduction
Understanding Frameworks and Best Practices
Secure Configuration
Secure Network Architecture – Zones Topologies
Secure Network Architecture – Network Segmentation
Secure Network Architecture – VPN
Secure Network Architecture – Device Placement
Implementing Secure Systems – Hardware Firmware Security
Implementing Secure Systems – Operating System Security
Implementing Secure Systems – Peripherals
Understanding the Importance of Secure Staging Concepts
Understanding Security Issues with Embedded Systems
Secure Application Development – Life Cycle Models
Secure Application Development – Version Control, Change Management, and Provisioning
Secure Application Development – Secure Coding Concepts
Secure Application Development – Code Quality and Testing
Security in Cloud and Virtualization Concepts
Understanding Resiliency and Automation Strategies to Reduce Risk
Implementing Physical Security Controls
Chapter 5: Identity Access Management
Introduction
Understanding Identity and Access Management
Configuring Identity and Access Services – Part 1
Configuring Identity and Access Services – Part 2
Implementing Identity and Access Management Controls
Account Management Practices – Part 1
Account Management Practices – Part 2
Chapter 6: Risk Management
Introduction
Understanding the Importance of Policies, Plans, and Procedures – Part 1
Understanding the Importance of Policies, Plans, and Procedures – Part 2
Understanding the Importance of Policies, Plans, and Procedures – Part 3
Business Impact Analysis Concepts
Risk Management Processes
Incident Response Procedures – Part 1
Incident Response Procedures – Part 2
Building and Planning Effective Business Continuity Plans
Computer Forensics Concepts – Part 1
Computer Forensics Concepts – Part 2
Understanding Disaster Recovery and Continuity of Operations – Part 1
Understanding Disaster Recovery and Continuity of Operations – Part 2
Understanding Types of Controls
Data Security and Privacy Practices
Chapter 7: Cryptography PKI
Introduction
Understanding the Concepts of Cryptography – Part 1
Understanding the Concepts of Cryptography – Part 2
Understanding the Concepts of Cryptography – Part 3
Describing the Characteristics of Cryptography Algorithms – Part 1
Describing the Characteristics of Cryptography Algorithms – Part 2
Implementing Wireless Security
Understanding Public Key Infrastructure (PKI) – Part 1
Understanding Public Key Infrastructure (PKI) – Part 2