Published 11/2024
MP4 | Video: h264, 1920×1080 | Audio: AAC, 44.1 KHz
Language: English | Size: 9.18 GB | Duration: 18h 15m
This course will cover the official exam objectives and details you need to pass the Security+ SY0-701 Official Exam.
What you’ll learn
Our course thoroughly covers all exam objectives to ensure you understand key concepts.
You will learn about attacks, threats & vulnerabilities, risk managment, enterprise security, cryptography & PKI, application security and much more.
Students will Learn to apply various security technologies and techniques to protect networks and systems.
Acquire knowledge on how to respond to security incidents and learn strategies to secure network architectures and communications.
Requirements
Security+ is an evtry level course with no official class prerequisites. Network skills and experience can be helpful, but not required.
Description
This course is taught by Jay Cotrone. Jay has held a cybersecurity professional position for 10 years and has been a technical instructor for over 24 years. Jay has used the knowledge he has gained to incorporate into this course, proven benefits for official exam success.Your knowledge of terms, study facts, acronyms and understanding processes will give you an advantage when taking official exams.In addition to videos, included in each section of the course are Section Reviews and Section Acronym Lists. Terms and study facts are covered in the video lectures and summarized in the Section Reviews. The Acronym Lists can help you remember important acronyms.There is a Section quiz at the end of each section to test your retention of the section information.This course includes multiple modalities utilizing visual and audible learning methods, including topic details on screen, synchronized with lecture audio to improve retention.This course also includes on-screen animations that enhance your understanding of processes.This course covers a large number of official exam objectives and details, essential for passing the official exam.This course is divided into 12 Sections: Here are a few topics covered in each section.· Security Fundamentalso Fundamental security conceptso CIA Triado Fundamental security termso Identification, Authentication, Authorization & Accounting· Asset ManagementAsset ManagementAsset TypesAsset Acquisition & ProcurementAsset Inventory & ClassificationAsset LifecycleChange Management· Identity & Access Managemento Identity & Access Managemento IAM Auditing & Loggingo Federated Authenticationo 802.1x Authenticationo IAM Processes & Protocolso Multifactor Authenticationo Password Policies & Managerso Passwordless Authentication· Risk Managemento Risk Typeso Risk Identificationo Risk Assessmento Risk Analysiso Risk Prioritizationo Privacy Complianceo Risk Monitoringo Third-Party Risk Assessment· Incident Response, Business Continuity & Disaster Recoveryo Incident Response Planso Incident Response Processo Digital Forensicso Business Continuity Planningo Incident Response Trainingo Disaster Recovery· Attacks, Threats & Vulnerabilitieso Malware Attackso Network Attackso Application Attackso Threat Actor Types, Attributes & Motivationso Threat Vectorso Threat Intelligenceo Vulnerability Managemento Software & Hardware Vulnerabilities· Enterprise Securityo Wireless Securityo Software Defined Networkingo Infrastructure as Codeo Serverless Architectureo Internet of Things Deviceso ICS & SCADA Systemso Secure Network Strategieso Zero Trusto Control Types· Security Governance & Security Trainingo Security Policieso Security Audits & Assessmentso Regulatory Complianceo Security Awareness Trainingo Phishing Identification Trainingo Phishing Victim Behavior· Cryptography & PKIo Cryptography Fundamentalso Public Key Infrastructureo Certificate Authoritieso Digital Certificateso Symmetric & Asymmetric Encryptiono Hashingo Physical Key Security· Application & Data Securityo Application Securityo Application Vulnerabilitieso Application Security Analysiso Data Managemento Data Location Planningo Data Loss Preventiono Data Privacy Technologieso Data Roles & Responsibilitieso Data Lifecycle· Endpoint Securityo Mobile Device Application Vulnerabilitieso Securing Mobile Deviceso Mobile Device Deployment Modelso Mobile Device Connection Methodso Securing Hostso Endpoint Detection & Responseo Securing Workstationso Securing Servers· Physical Securityo Physical Securityo Secure Entryo Video Surveillanceo Sensors & Alarmso HVAC Securityo Power RedundancyThe above is just a summary of section topics, there are many more topics covered throughout the course. To see the extent of topics covered, please refer to the course video list.We know that this course will give the knowledge of the official exam objectives and details you need to pass the Security+ SY0-701 exam.
Overview
Section 1: Introduction
Lecture 1 CompTIA Security+ SY0-701 Course Introduction
Lecture 2 CompTIA Security+ SY0-701 Exam Details
Section 2: Security Fundamentals
Lecture 3 Fundamental Security Concepts
Lecture 4 Fundamental Security Terms
Lecture 5 IAAA – Identity, Authentication, Authorization & Accounting
Section 3: Asset Management
Lecture 6 Asset Management
Lecture 7 Asset Lifecycle
Lecture 8 Asset Types
Lecture 9 Asset Acquisition and Procurement
Lecture 10 Asset Inventory & Classification
Lecture 11 Change Management
Section 4: Identity & Access Management
Lecture 12 Identity & Access Management
Lecture 13 IAM Processes & Protocols
Lecture 14 IAM Auditing & Logging
Lecture 15 IAM Interoperability
Lecture 16 Federated Authentication
Lecture 17 802.1x Authentication
Lecture 18 Multifactor Authentication
Lecture 19 Biometric Authentication
Lecture 20 Password Policies & Managers
Lecture 21 Passwordless Authentication
Lecture 22 Privileged Access Management
Lecture 23 Access Control Models
Lecture 24 Accounting & Auditing
Section 5: Risk Management
Lecture 25 Risk Management
Lecture 26 Risk Types
Lecture 27 Privacy Risks
Lecture 28 Privacy Compliance
Lecture 29 Risk Identification
Lecture 30 Risk Categorization
Lecture 31 Risk Assessment
Lecture 32 Risk Analysis
Lecture 33 Risk Impact Analysis
Lecture 34 Risk Prioritization
Lecture 35 Risk Management Strategies
Lecture 36 Documenting Risk
Lecture 37 Risk Monitoring
Lecture 38 Risk Reporting
Lecture 39 Third-Party Risk Assessment
Lecture 40 Third-Party Agreement Types
Section 6: Incident Response, Business Continuity & Disaster Recovery
Lecture 41 Incident Response
Lecture 42 Incident Response Plans
Lecture 43 Incident Response Process
Lecture 44 Digital Forensics
Lecture 45 Incident Response Training
Lecture 46 Disaster Recovery
Section 7: Attacks, Threats & Vulnerabilities
Lecture 47 Malware Attacks
Lecture 48 Network Attacks
Lecture 49 Application Attacks
Lecture 50 Cryptographic & Password Attacks
Lecture 51 Social Engineering
Lecture 52 Indicators of Compromise (IoC
Lecture 53 Threat Actor Types
Lecture 54 Threat Actor Attributes
Lecture 55 Threat Actor Sophistication
Lecture 56 Threat Actor Motivations
Lecture 57 Nation State Actors
Lecture 58 Threat Vectors
Lecture 59 Web Based Threat Vectors
Lecture 60 Phishing
Lecture 61 Anti-Phishing Campaign
Lecture 62 Threat Intelligence
Lecture 63 External Third-Party Threat Intelligence Sources
Lecture 64 Threat Information Processing
Lecture 65 Threat Hunting
Lecture 66 Vulnerability Management
Lecture 67 Common Vulnerabilities
Lecture 68 Software & Hardware Vulnerabilities
Lecture 69 Cloud Service Vulnerabilities
Lecture 70 Cryptographic Vulnerabilities
Lecture 71 Virtualization Vulnerabilities
Lecture 72 Supply Chain Vulnerabilities
Lecture 73 Mobile Device Vulnerabilities
Lecture 74 Wireless Network & Bluetooth Vulnerabilities
Lecture 75 Vulnerability Identification
Lecture 76 Vulnerability Classification
Lecture 77 Vulnerability Mitigation
Lecture 78 Penetration Testing
Lecture 79 Penetration Test Phases
Section 8: Enterprise Security
Lecture 80 Virtualization
Lecture 81 Secure Network Strategies
Lecture 82 Wireless Security
Lecture 83 Wireless Authentication Protocols
Lecture 84 Software Defined Networking
Lecture 85 Infrastructure as Code
Lecture 86 Serverless Architecture
Lecture 87 Microservices
Lecture 88 Specialized Systems
Lecture 89 Internet of Things Devices
Lecture 90 ICS & SCADA Systems
Lecture 91 Gap Analysis
Lecture 92 Zero Trust
Lecture 93 High Availability
Lecture 94 Redundancy & Resilience
Lecture 95 Deception & Disruption Technology
Lecture 96 Cybersecurity Control Categories
Lecture 97 Control Types
Lecture 98 Technical Controls
Lecture 99 Managerial Controls
Lecture 100 Operational Controls
Lecture 101 Physical Controls
Lecture 102 Deterent Controls
Lecture 103 Preventitive Controls
Lecture 104 Detective Controls
Lecture 105 Corrective Controls
Lecture 106 Compensating Controls
Lecture 107 Directive Controls
Lecture 108 Enterprise Security Mitigation Techniques
Lecture 109 Network Segregation Security Techniques
Lecture 110 Techincal Control Appliance Network Placement
Lecture 111 Data Loss Prevention System Placement
Lecture 112 Proxy Server System Placement
Lecture 113 Unified Threat Management Placement
Lecture 114 Antivirus & Anti Malware System Placement
Lecture 115 Logical Network Security Segregation
Lecture 116 Configuration Baselines
Lecture 117 Network Hardening
Lecture 118 Group Policies
Lecture 119 Detection Methods
Lecture 120 Secure Protocols
Lecture 121 Internet Protocol Security
Lecture 122 File Integrity Monitoring
Lecture 123 Security Monitoring
Lecture 124 Port Security
Lecture 125 Automation
Lecture 126 Orchestration
Lecture 127 Securing Processes & Devices
Lecture 128 SD-WAN & SASE
Lecture 129 Cloud Security
Lecture 130 Security Exercises
Section 9: Security Governance & Security Training
Lecture 131 Security Governance
Lecture 132 Security Policies
Lecture 133 Security Audits & Assessments
Lecture 134 Regulatory Compliance
Lecture 135 Regulatory Compliance Monitoring
Lecture 136 Managerial Security
Lecture 137 Security Awareness Training
Lecture 138 Phishing Identification Training
Lecture 139 Phishing Victim Behavior
Section 10: Cryptography & PKI
Lecture 140 Cryptography Fundamentals
Lecture 141 Public Key Infrastructure
Lecture 142 Certificate Authorities
Lecture 143 Digital Certificates
Lecture 144 Digital Certificate Attributes & Extensions
Lecture 145 Certificate Revocation Validation
Lecture 146 Asymmetric Encryption
Lecture 147 Symmetric Encryption
Lecture 148 Storage & Transport Encryption
Lecture 149 Hashing
Lecture 150 Private Key Security
Section 11: Application & Data Security
Lecture 151 Application Security
Lecture 152 Application Security Analysis
Lecture 153 Application Vulnerabilities
Lecture 154 Application Vulnerability Mitigation
Lecture 155 Application Security Enforcement & Protection
Lecture 156 Data Management
Lecture 157 Data Roles & Responsibilities
Lecture 158 Data Lifecycle
Lecture 159 Data Location Planning
Lecture 160 Data Security
Lecture 161 Data Loss Prevention
Lecture 162 Data De-Identification
Lecture 163 Data Privacy Tehnologies
Section 12: Endpoint Security
Lecture 164 Securing Hosts
Lecture 165 Mobile Device Deployment Models
Lecture 166 Mobile Device Connection Methods
Lecture 167 Mobile Device Application Vulnerabilities
Lecture 168 Securing Mobile Devices
Lecture 169 Endpoint Detection & Response
Lecture 170 Securing Workstations
Lecture 171 Securing Servers
Section 13: Physical Security
Lecture 172 Physical Security
Lecture 173 Secure Entry
Lecture 174 Video Surveillance
Lecture 175 Sensors & Alarms
Lecture 176 HVAC Security
Lecture 177 Power Redundancy
This is a great course to start your cerification path as a Cybersecurity Professional. Our course will provide a technical foundation for the Security+ exam and future cybersecurity certifications.
https://anonymz.com/?https://www.udemy.com/course/comptia-security-sy0-701-s/