Companies Home Search Profile

CompTIA Security+ Certification SY0-601: The Total Course

Focused View

Mike Meyers

17:23:30

110 View
  • 00001 Promo.mp4
    00:42
  • 00002 Introduction.mp4
    02:35
  • 00003 About the Security+ SY0-601 Exam.mp4
    03:07
  • 00004 Defining Risk.mp4
    08:23
  • 00005 Threats and Vulnerabilities.mp4
    07:04
  • 00006 Threat Intelligence.mp4
    10:59
  • 00007 Risk Management Concepts.mp4
    07:24
  • 00008 Security Controls.mp4
    09:23
  • 00009 Risk Assessments and Treatments.mp4
    05:44
  • 00010 Quantitative Risk Assessments.mp4
    06:38
  • 00011 Qualitative Risk Assessments.mp4
    03:54
  • 00012 Business Impact Analysis.mp4
    09:18
  • 00013 Data Types and Roles.mp4
    11:29
  • 00014 Security and the Information Life Cycle.mp4
    09:03
  • 00015 Data Destruction.mp4
    06:04
  • 00016 Personnel Risk and Policies.mp4
    10:22
  • 00017 Third-Party Risk Management.mp4
    08:29
  • 00018 Agreement Types.mp4
    06:41
  • 00019 Cryptography Basics.mp4
    15:56
  • 00020 Data Protection.mp4
    08:37
  • 00021 Cryptographic Methods.mp4
    07:19
  • 00022 Symmetric Cryptosystems.mp4
    12:42
  • 00023 Symmetric Block Modes.mp4
    08:15
  • 00024 Asymmetric Cryptosystems.mp4
    12:48
  • 00025 Diffie-Hellman.mp4
    06:35
  • 00026 Hashing.mp4
    08:43
  • 00027 Understanding Digital Certificates.mp4
    07:40
  • 00028 Trust Models.mp4
    04:45
  • 00029 Public Key Infrastructure.mp4
    03:39
  • 00030 Certificate Types.mp4
    14:11
  • 00031 Touring Certificates.mp4
    08:48
  • 00032 Cryptographic Attacks.mp4
    05:23
  • 00033 Password Cracking.mp4
    10:13
  • 00034 Password Cracking Demo.mp4
    06:08
  • 00035 Identification Authentication and Authorization.mp4
    08:01
  • 00036 Enabling Multifactor Authentication.mp4
    04:46
  • 00037 Authorization.mp4
    04:50
  • 00038 Accounting.mp4
    05:24
  • 00039 Authentication Methods.mp4
    14:07
  • 00040 Access Control Schemes.mp4
    06:50
  • 00041 Account Management.mp4
    13:05
  • 00042 Network Authentication.mp4
    09:04
  • 00043 Identity Management Systems.mp4
    06:02
  • 00044 Touring the CLI.mp4
    16:28
  • 00045 Shells.mp4
    06:17
  • 00046 The Windows Command Line.mp4
    04:36
  • 00047 Microsoft PowerShell.mp4
    12:33
  • 00048 Linux Shells.mp4
    11:48
  • 00049 Python Scripts.mp4
    07:25
  • 00050 Windows Command-Line Tools.mp4
    16:22
  • 00051 Linux Command-Line Tools.mp4
    09:35
  • 00052 Network Scanners.mp4
    05:14
  • 00053 Network Scanning with Nmap.mp4
    08:58
  • 00054 Network Protocol Analyzers.mp4
    08:01
  • 00055 Using Wireshark to Analyze Network Traffic.mp4
    09:04
  • 00056 Using tcpdump to Analyze Network Traffic.mp4
    08:16
  • 00057 Log Files.mp4
    08:56
  • 00058 Centralized Logging.mp4
    09:03
  • 00059 Configuring Linux Log Forwarding.mp4
    08:28
  • 00060 Malware.mp4
    13:42
  • 00061 Weak Configurations.mp4
    11:36
  • 00062 Common Attacks.mp4
    09:05
  • 00063 Driver and Overflow Attacks.mp4
    07:54
  • 00064 Password Attacks.mp4
    08:04
  • 00065 Bots and Botnets.mp4
    06:14
  • 00066 Disk RAID Levels.mp4
    10:19
  • 00067 Securing Hardware.mp4
    11:04
  • 00068 Securing Endpoints.mp4
    09:13
  • 00069 The OSI Model.mp4
    12:30
  • 00070 ARP Cache Poisoning.mp4
    08:45
  • 00071 Other Layer 2 Attacks.mp4
    05:22
  • 00072 Network Planning.mp4
    07:05
  • 00073 Load Balancing.mp4
    05:39
  • 00074 Securing Network Access.mp4
    06:23
  • 00075 Honeypots.mp4
    06:02
  • 00076 Firewalls.mp4
    11:17
  • 00077 Proxy Servers.mp4
    06:16
  • 00078 Network and Port Address Translation.mp4
    06:50
  • 00079 IP Security IPsec.mp4
    08:59
  • 00080 Virtual Private Networks VPNs.mp4
    10:07
  • 00081 Intrusion Detection and Prevention Systems IDS IPS.mp4
    13:03
  • 00082 Wi-Fi Encryption Standards.mp4
    09:43
  • 00083 RFID NFC and Bluetooth.mp4
    06:51
  • 00084 Wi-Fi Coverage and Performance.mp4
    08:21
  • 00085 Wi-Fi Discovery and Attacks.mp4
    12:10
  • 00086 Cracking WPA2.mp4
    10:24
  • 00087 Wi-Fi Hardening.mp4
    10:40
  • 00088 Defining a Public Server.mp4
    00:45
  • 00089 Common Attacks and Mitigations.mp4
    09:47
  • 00090 Containers and Software-Defined Networking.mp4
    11:28
  • 00091 Hypervisors and Virtual Machines.mp4
    08:25
  • 00092 Cloud Deployment Models.mp4
    08:46
  • 00093 Cloud Service Models.mp4
    08:28
  • 00094 Securing the Cloud.mp4
    10:21
  • 00095 Embedded Systems.mp4
    13:19
  • 00096 Industrial Control System ICS.mp4
    06:44
  • 00097 Internet of Things IoT Devices.mp4
    10:04
  • 00098 Connecting to Dedicated and Mobile Systems.mp4
    10:53
  • 00099 Security Constraints for Dedicated Systems.mp4
    05:09
  • 00100 Mobile Device Deployment and Hardening.mp4
    11:13
  • 00101 Physical Security Overview.mp4
    00:58
  • 00102 Physical Security.mp4
    09:53
  • 00103 Keylogger Demo.mp4
    04:44
  • 00104 Environmental Controls.mp4
    05:24
  • 00105 DNS Security.mp4
    05:10
  • 00106 FTP Packet Capture.mp4
    03:29
  • 00107 Secure Web and E-mail.mp4
    11:58
  • 00108 Request Forgery Attacks.mp4
    04:56
  • 00109 Cross-Site Scripting Attacks.mp4
    07:16
  • 00110 Web Application Security.mp4
    08:02
  • 00111 Web App Vulnerability Scanning.mp4
    05:53
  • 00112 Testing Infrastructure Overview.mp4
    04:31
  • 00113 Social Engineering.mp4
    05:58
  • 00114 Social Engineering Attacks.mp4
    10:47
  • 00115 Vulnerability Assessments.mp4
    09:00
  • 00116 Penetration Testing.mp4
    09:47
  • 00117 Security Assessment Tools.mp4
    11:38
  • 00118 The Metasploit Framework.mp4
    08:09
  • 00119 Incident Response Overview.mp4
    02:58
  • 00120 Incident Response Plans IRPs.mp4
    06:01
  • 00121 Threat Analysis and Mitigating Actions.mp4
    07:40
  • 00122 Digital Forensics.mp4
    12:14
  • 00123 Gathering Digital Evidence.mp4
    09:44
  • 00124 Business Continuity and Alternate Sites.mp4
    06:11
  • 00125 Data Backup.mp4
    09:55
  • Description


    Excel in the CompTIA Security+ Certification SY0-601 exam by taking this course, which deep dives into the various concepts of risk management and kinds of risk involved, and the various security standards such as PCI DSS and the Cloud Controls Matrix (CCM) define what types of security controls to put in place to mitigate risk, both on-premises and in the cloud.

    Learn about data protection and the various cryptographic methods used to protect the critical keys in cryptography that keep communication secure. The course also reviews different types of certificates including web, email, code-signing, machine/computer, and user. Explore the 3 As—authentication, authorization, and accounting/auditing, which play a big role in IT security.

    Tracking activity through auditing provides accountability for access to resources such as files on a file server or database rows. Learn about securing dedicated systems using IoT. IoT devices are function-specific and can communicate over the Internet. Examples include environmental control devices, medical devices, and video surveillance systems. This episode also covers the Zigbee smart home automation protocol.

    Wrap up the course by understanding data backup; backing up data provides availability in the event of data deletion, corruption, or encryption through ransomware. This episode discusses backup settings such as compression and encryption, as well as full, differential, and incremental backup types.

    All resources are placed here: https://github.com/PacktPublishing/CompTIA-Security-Certification-SY0-601-The-Total-Course

    More details


    User Reviews
    Rating
    0
    0
    0
    0
    0
    average 0
    Total votes0
    Focused display
    Total Seminars, LLC, is a provider of PC and network repair seminars and certification training services through books, videos, and courseware for thousands of organizations throughout the world including the United Nations, the FBI, and all branches of the US Department of Defense.Mike Meyers is the president and co-founder of Total Seminars, which produces the best-selling CompTIA A+ and Network+ Certification books with over 1 million books in print. He is affectionately called the “Alpha Geek” and is the industry’s leading authority on CompTIA Certifications. He has created several other best-selling video courses on CompTIA certifications with the Total Seminars team of instructors.Mike has been involved in the computer and network repair industry since 1987 as a technician, instructor, author, consultant, and speaker. He is the author of numerous popular PC books and videos, including the best-selling CompTIA A+ Certification All-In-One Exam Guide and Com
    Packt is a publishing company founded in 2003 headquartered in Birmingham, UK, with offices in Mumbai, India. Packt primarily publishes print and electronic books and videos relating to information technology, including programming, web design, data analysis and hardware.
    • language english
    • Training sessions 125
    • duration 17:23:30
    • Release Date 2023/02/07

    Courses related to CompTIA Security+