Video description
23+ Hours of Video Instruction
Get intensive, hands-on CompTIA Security+ training with Sari Greene in this 2-day / 8-hour live training course: CompTIA Security+ SY0-601 Certification Crash Course.
CompTIA Security+ (SY0-601) Complete Video Course is an engaging self-paced video training solution that provides learners with more than 23 hours of personal training from security expert Sari Greene. Through the use of topic-focused instructional videos, you will gain an in-depth understanding of each objective in the CompTIA Security+ (SY0-601) exam, as well as a deeper understanding of security foundations and principles to ensure exam success.
CompTIA Security+ (SY0-601) Complete Video Course contains more than 23 hours of training with content divided into 5 modules with 35 content-targeted lessons. This title covers every objective in the newly updated CompTIA Security+ SY0-601 exam and includes screencast teaching, deep dives on security theory and everyday practices, question reviews, and live demos/labs showing how to complete tasks in real time. Most lessons end with a “Security in Action” segment, which takes the security knowledge you’ve learned to the next level.
The video lessons in this course review each exam objective, so you can use it as a complete study tool for taking the CompTIA Security+ exam.
This course also includes:
- A practice exam that runs in the Pearson test prep software
Major sections are as follows:- Threats, Attacks and Vulnerabilities
- Architecture and Design
- Implementation
- Operations and Incident Response
- Governance, Risk & Compliance
About the Instructor
Sari is the author of Security Program and Policies: Principles and Practices and is currently being used in undergraduate and graduate programs nationwide. She is also the author and presenter of the best-selling Security + SY0-501 Complete Video Course as well as the CISSP Complete Video Course and the CISA Complete Video Course. Sari has published numerous articles related to cybersecurity; has been quoted in the New York Times, Wall Street Journal, CNN, and CNBC; speaks regularly at cybersecurity, legal, financial, and healthcare conferences around the country; and is a frequent guest lecturer.
Sari holds multiple industry accreditations including CISSP-ISSMP, CRISC, CISM, CISA, MCSE, Sec+, and NSA/IAM. She is a strong proponent of certification and continuing education. Sari is committed to training the next generation of cybersecurity practitioners who are dedicated to protecting their company, their community, and their country.
You can contact Sari at sari@sarigreenegroup.com
, follow her on Twitter at @sari_greene or visit her website http://www.sarigreenegroup.com
.
Skill Level
Learn How To- Confidently understand every objective on the CompTIASecurity+ exam—this course covers every objective and topic in depth.
- Prepare for exam success—Sari shares her best practices forstudying for and taking the Security+ exam.
- Enhance your real-world cybersecurity skills and knowledge
Who Should Take This Course- Anyone preparing for the CompTIA Security+ examination. Secondaryaudiences: IT professionals
- Anyone interested in learning security fundamentals
Course Requirements- Day-to-day information technology or cybersecurity experience.
- Note: CompTIA recommends but does not require at least twoyears of experience in IT administration with a focus on security prior totaking the certification exam.
Lesson Descriptions
Module 1, “Threats, Attacks, and Vulnerabilities,” corresponds to the firstCompTIA domain. 24% of the exam questions will relate to this domain, and eachlesson within Module 1 aligns with the eight exam objectives. Module 1 willcover social engineering principles, tactics, techniques, attack vectors,malware families and attributes, password attacks, physical attacks,adversarial artificial intelligence, and identifying indicators of compromise(IOC). The lessons will then move into application weaknesses, validationissues, injection, XSS and forgery attacks, and explore various system attacks.Next up, it will take a look at digitalinfrastructure attacks, wireless attacks, and malicious code or script executionincluding using PowerShell, Python. and Bash. The lessons also discussadversaries including means and motivation, threat modeling, and how to useOSINT—open source intelligence. The later lessons in this module cover some ofthe most common and dangerous operational vulnerabilities, risks associatedwith third-parties, threat hunting, vulnerability identification, andautomation tools including SIEM and SOAR. Lastly, the module discusses the importance of penetrationtesting, pen testing options, and how pen testing really works.
Module 2, “Architecture and Design,” corresponds to the second CompTIA domain, which makes up 21% of the exam questions. Within this module, configuration management, data protection concepts, deception and disruption techniques, and tactics are covered. It then examines the security and performance features of virtualization, cloud deployment, and cloud service models. Secure staging workflow, secure coding techniques, and the role of automation with a focus on identify management, authentication factors, attributes and methods, as well as a deep dive into biometrics. The lesson then discusses resiliency, non-persistence, redundancy, and backup and recovery techniques including RAID and replication. Next up is defining what embedded and IoT systems are, look at why and when they are embedded they are vulnerable to attack, and discuss best practices for securing embedded and IoT systems. The module then focuses attention on building and facility design considerations and controls, environmental issues such as air flow, heat, humidity, electrostatic discharge, date emanation, fire, and power as well as secure data destruction. The next lesson begins with a primer, and then surveys cryptographic and related use cases and techniques including steganography, symmetric encryption, asymmetric encryption, hashing, digital signatures, and emerging cryptography.
Module 3, “Implementation,” corresponds to 25% of the exam questions and covers a lot. The module starts by looking at the practical application and use cases of secure communications and network protocols including SSl/TLS, SSH, DNSSEC, SNMPv3, and secure email protocols. Then, it surveys trusted computing-base components and endpoint security solutions, as well as meeting security objectives by implementing zone, segmentation, and isolation options and network appliances including jump servers, proxy servers, IDS/IPS, NACS, firewalls and VPNS. The lesson ends with a look at the TCP/IP model. The module continues with a dive into wireless design and configuration options with an emphasis on planning a secure wireless network, as well as looking at mobile device connection methods, mobile device deployment options, Mobile device management solutions (commonly known as MDM), and mobile device concerns including attack vectors. Next up is revisiting the cloud environment—this time from an infrastructure perspective. The module looks at design options; use of virtual private clouds and critically cloud security controls; explores the entire user identity and access management lifecycle; and dives into the configuration elements of network and web services including LDAP, Kerberos, TACACS+, RADIUS, CHAP, PAP, SAML, OpenID Connect, OAuth 2.0, and Shibboleth as well as access control and authorization models. Lastly, the module focuses on creating and managing digital certificates as well as cryptovariable (key) management and best practices.
Module 4, “Operations and Incident Response,” covers about 16% of the exam and starts by surveying network reconnaissance and discovery approaches; tools and techniques including scanning, packet capture, and netflows; and introduces Linux operating system commands security practitioners should be familiar with. Then, the importance of incident response preparedness is discussed, as well as defining the elements of an incident response plan, identifying the phases of incident response, reviewing the process, and studying attack frameworks. Next, the module revisits a number of data sources including scans, logs, and metadata from an investigative perspective. The final lessons of this module discuss a variety of manual and automated mitigation, containment and eradication techniques and controls, and then tackles forensic fundamentals including evidence collection, data acquisition and breach disclosure, and notification requirements.
Module 5, “Governance, Risk and Compliance,” covers about 14% of the exam. The module starts by taking a close look at control management, control classifications, and control objectives, which taken together comprise an defense-in-depth environment. It then dives into cybersecurity and privacy related regulations and obligations and how to build a compliance information security program incorporating frameworks, benchmarks, and audit standards. The module then examines the role of policies and supporting governance documents, identify key personnel and operational policies and practices, as well as third-party and supply chain risk management. Next, the module identifies fundamental risk management and assessment concepts, teaches how to conduct a quantitative risk assessment and walks through the fundamental concepts of business continuity, including facilitating a business impact assessment. Lastly, it focuses on data classification, privacy requirements and obligations, roles and responsibilities, privacy enhancing technologies, and the relationship between cybersecurity and privacy.
About Pearson Video Training
Pearson publishes expert-led video tutorials covering a wide selection of technology topics designed to teach you the skills you need to succeed. These professional and personal technology videos feature world-leading author instructors published by your trusted technology brands: Addison-Wesley, Cisco Press, Pearson IT Certification, Sams, and Que. Topics include IT Certification, Network Security, Cisco Technology, Programming, Web Development, Mobile Development, and more.
Learn more about Pearson Video training at http://www.informit.com/video
.
Table of Contents
Introduction
CompTIA Security+ SY0-601: Introduction
Module 1: Attacks, Threats, and Vulnerabilities
Introduction to Module 1
Lesson 1: Compare and Contrast Different Types of Social Engineering Techniques
Learning Objectives
1.1 Social Engineering Principles
1.2 Social Engineering Attack Vectors
1.3 Influence Campaigns
Closer Look Lab: Phone and Text Spoofing
Lesson 2: Given a Scenario, Analyze Indicators of Compromise and Determine the Malware
Learning Objectives
2.1 Malware Primer
2.2 Malware Families
2.3 Password Attacks
2.4 Physical Attacks
2.5 Adversarial Artificial Intelligence
2.6 Indicators of Compromise
Closer Look Lab: Malware Analysis
Lesson 3: Given a Scenario, Analyze Potential Indicators Associated with Application Attacks
Learning Objectives
3.1 Input and Output Validation
3.2 Injection, XSS and Forgery Attacks
3.3 System Attacks
Closer Look Lab: Constructing Error Messages
Lesson 4: Given a Scenario, Analyze Potential Indicators Associated with Network Attacks
Learning Objectives
4.1 Digital Infrastructure Attacks
4.2 Wireless Attacks
4.3 Code or Script Execution
Closer Look Lab: Powershell
Lesson 5: Explain Different Threat Actors, Vectors and Intelligence Sources
Learning Objectives
5.1 Threat Actors and Attributes
5.2 Threat Modeling
5.3 Threat Intelligence
Closer Look Lab: Threat Intelligence Workflow
Lesson 6: Explain the Security Concerns Associated with Various Types of Vulnerabilities
Learning Objectives
6.1 Operational Vulnerabilities
6.2 Third-party Risks
Closer Look Lab: Zero Day Vulnerability
Lesson 7: Summarize the Techniques Used in Security Assessments
Learning Objectives
7.1 Threat Hunting and Vulnerability Identification
7.2 Syslog, SIEM, and SOAR
Closer Look Lab: Common Vulnerabilities and Exposures
Lesson 8: Explain the Techniques Used in Penetration Testing
Learning Objectives
8.1 Penetration Testing Concepts
8.2 Penetration Testing Techniques
Closer Look Lab: Passive Reconnaissance
Module 1 REVIEW
Module 2: Architecture and Design
Introduction to Module 2
Lesson 9: Explain the Importance of Security Concepts in an Enterprise Environment
Learning Objectives
9.1 Configuration Management
9.2 Data Protection
9.3 Deception and Disruption
Closer Look Lab: Honeypots
Lesson 10: Summarize Virtualization and Cloud Computing Concepts
Learning Objectives
10.1 Cloud Computing
10.2 Virtualization
Closer Look Lab: Virtualization
Lesson 11: Summarize Secure Application Development, Deployment, and Automation Concepts
Learning Objectives
11.1 Secure Staging
11.2 Secure Coding Techniques
11.3 Automation
Closer Look Lab: Open Web Application Security Project (OWASP)
Lesson 12: Summarize Authentication and Authorization Design Concepts
Learning Objectives
12.1 Identity Management
12.2 Authentication Factors
12.3 Biometrics
Closer Look Lab: Pwned Passwords
Lesson 13: Given a Scenario, Implement Cybersecurity Resilience
Learning Objectives
13.1 Resiliency and Redundancy
13.2 Backup and Recovery
Closer Look Lab: RAID
Lesson 14: Explain the Security Implications of Embedded and Specialized Systems
Learning Objectives
14.1 Embedded Systems
14.2 Internet of Things
Closer Look Lab: Raspberry Pi
Lesson 15: Explain the Importance of Physical Security Controls
Learning Objectives
15.1 Site and Building Security
15.2 Environmental Controls
15.3 Secure Data Destruction
Closer Look Lab: Disk Wiping
Lesson 16: Summarize the Basics of Cryptographic Concepts
Learning Objectives
16.1 Cryptography Primer
16.2 Steganography
16.3 Symmetric Encryption
16.4 Asymmetric Encryption
16.5 Hashing
16.6 Digital Signatures
16.7 Emerging Cryptography
Closer Look Lab: Hashing
Module 2 REVIEW
Module 3: Implementation
Introduction to Module 3
Lesson 17: Given a Scenario, Implement Secure Protocols
Learning Objectives
17.1 Secure Communications Protocols
17.2 Secure Network Protocols
Closer Look Lab: SSL/TLS Packets
Lesson 18: Given a Scenario, Implement Host or Application Security Solutions
Learning Objectives
18.1 Trusted Computing Base
18.2 Endpoint Security
18.3 Database and Application Security
Closer Look Lab: Endpoint Firewall
Lesson 19: Given a Scenario, Implement Secure Network Designs
Learning Objectives
19.1 Zones and Segments
19.2 Network Appliances
19.3 Firewalls
19.4 Virtual Private Networks
19.5 TCP/IP
Closer Look Lab: IPv6 Addressing
Lesson 20: Given a Scenario, Install and Configure Wireless Security Settings
Learning Objectives
20.1 Wireless Configuration
20.2 Wireless Design
Closer Look Lab: Wireless Heat Map
Lesson 21: Given a Scenario, Implement Secure Mobile Solutions
Learning Objectives
21.1 Mobile Connectivity
21.2 Mobile Device Management
Closer Look Lab: Mobile Device Ownership and Deployment Options
Lesson 22: Given a Scenario, Apply Cybersecurity Solutions to the Cloud
Learning Objectives
22.1 Cloud Infrastructure
22.2 Virtual Private Clouds
22.3 Cloud Security Controls
Closer Look Lab: CSA Cloud Controls Matrix
Lesson 23: Given a Scenario, Implement Identity and Account Management Controls
Learning Objectives
23.1 Identity and Access Management
Closer Look Lab: Sign-in Risk Triggers
Lesson 24: Given a Scenario, Implement Authentication and Authorization Solutions
Learning Objectives
24.1 Authentication Protocols
24.2 Federated Identity
24.3 Authorization and Access Control
Closer Look Lab: OAuth 2.0 in Action
Lesson 25: Given a Scenario, Implement Public Key Infrastructure
Learning Objectives
25.1 PKI Cryptographic Review
25.2 Digital Certificates
25.3 Digital Certificate Lifecycle
25.4 Key Management
Closer Look Lab: Digital Certificates
Module 3 Review
Module 4: Operations and Incident Response
Introduction to Module 4
Lesson 26: Given a Scenario, Use the Appropriate Tool to Assess Organizational Security
Learning Objectives
26.1 Reconnaissance and Discovery
26.2 Packet Capture and NetFlows
26.3 Linux Commands
Closer Look Lab: ZenMap
Lesson 27: Summarize the Importance of Policies, Processes, and Procedures for Incident Response
Learning Objectives
27.1 Incident Response Plans
27.2 Incident Handling Process
Closer Look Lab: Mitre ATT Framework
Lesson 28: Given an Incident, Utilize Appropriate Data Sources to Support an Investigation
Learning Objectives
28.1 Data Sources
Closer Look Lab: Log Files
Lesson 29: Given an Incident, Apply Mitigation Techniques or Controls to Secure an Environment
Learning Objectives
29.1 Incident Mitigation
Closer Look Lab: SOAR
Lesson 30: Explain the Key Aspects of Digital Forensics
Learning Objectives
30.1 Forensic Evidence
30.2 Forensic Examination
30.3 Disclosure and Notification
Closer Look Lab: RAM Capture
Module 4 Review
Module 5: Governance, Risk, and Compliance
Introduction to Module 5
Lesson 31: Compare and Contrast Various Types of Controls
Learning Objectives
31.1 Controls and Countermeasures
Closer Look Lab: Overlapping Control Categories
Lesson 32: Explain the Importance of Applicable Regulations Standards or Frameworks That Impact Organizational Security Posture
Learning Objectives
32.1 Compliance and Regulations
32.2 Frameworks and Guidance
32.3 Benchmarks and Audit Standards
Closer Look Lab: CIS Benchmarks
Lesson 33: Explain the Importance of Policies to Organizational Security
Learning Objectives
33.1 Governance and Policies
33.2 Personnel Policies
33.3 Personnel Practices
33.4 Organizational Policies
33.5 Third-party Risk Management
Closer Look Lab: Policy Standards
Lesson 34: Summarize Risk Management Processes and Concepts
Learning Objectives
34.1 Risk Management
34.2 Risk Assessment
34.3 Business Continuity
Closer Look Lab: Quantitative Risk Assessment
Lesson 35: Explain Privacy and Sensitive Data Concepts in Relation to Security
Learning Objectives
35.1 Privacy Principles
35.2 Privacy Management
Closer Look Lab: Privacy Walkthrough
Lesson 36: Preparing for the Exam
Learning Objectives
36.1 Understanding the Security+ Exam Structure
36.2 Study Strategies
36.3 Test Taking Strategies
36.4 Testing Options
36.5 Attaining and Maintaining Your Security+ Certification
Module 5 Review
Summary
CompTIA Security+ SY0-601: Summary