Companies Home Search Profile

CompTIA Security+ (Exam SY0-601)

Focused View

Stone River eLearning

10:47:47

8 View
  • 1 - Instructor Introduction.mp4
    02:33
  • 2 - Course Introduction.mp4
    02:59
  • 1 - Quiz 1.html
  • 3 - Understanding Threats Attacks and Vulnerabilities.mp4
    00:58
  • 4 - Topic A Introduction to Security Concepts.mp4
    00:21
  • 5 - Security Fundamentals.mp4
    02:55
  • 6 - Security Terms.mp4
    02:48
  • 7 - Topic B Identifying Threat Actors and Vectors.mp4
    00:53
  • 8 - Actors and Threats.mp4
    06:24
  • 9 - Hackers.mp4
    02:02
  • 10 - Actor Attributes.mp4
    01:46
  • 11 - Attack Vectors.mp4
    03:29
  • 12 - Information Gathering.mp4
    04:53
  • 13 - Intelligence Sources.mp4
    02:02
  • 14 - Research Sources.mp4
    02:47
  • 15 - Demo Research Sources.mp4
    03:49
  • 16 - Topic C Understanding Vulnerabilities.mp4
    01:04
  • 17 - Vulnerability Fundamentals.mp4
    03:02
  • 18 - Security Impacts.mp4
    04:28
  • 19 - Vulnerability Types.mp4
    04:36
  • 20 - Vulnerability Types cont.mp4
    01:59
  • 21 - Topic D Understanding Attack Types.mp4
    00:31
  • 22 - Attack Types.mp4
    00:54
  • 23 - Understanding Malware Types.mp4
    06:59
  • 24 - Attacking Passwords and User Credentials.mp4
    03:15
  • 25 - Physical Attacks.mp4
    02:54
  • 26 - Other Attack Types.mp4
    03:52
  • 27 - Topic E Identifying Social Engineering Techniques.mp4
    00:46
  • 28 - Social Engineering Principles.mp4
    01:19
  • 29 - Phishing.mp4
    04:08
  • 30 - Other Social Engineering Types.mp4
    02:59
  • 31 - Other Social Engineering Types cont.mp4
    03:39
  • 32 - Chapter 1 Review.mp4
    00:54
  • 2 - Quiz 2.html
  • 33 - Analyzing Attacks.mp4
    01:02
  • 34 - Topic A Security Assessment Tools and Techniques.mp4
    00:36
  • 35 - Understanding Assessments.mp4
    01:25
  • 36 - Threat Hunting.mp4
    02:46
  • 37 - Vulnerability Scanning.mp4
    03:41
  • 38 - Syslog and SIEM.mp4
    01:23
  • 39 - SIEM Components.mp4
    02:55
  • 40 - Topic B Application Attacks.mp4
    00:28
  • 41 - Application Attacks.mp4
    00:20
  • 42 - Privilege Escalation.mp4
    00:55
  • 43 - CrossSite Scripting.mp4
    01:29
  • 44 - Injections.mp4
    01:50
  • 45 - Application Attack Issues.mp4
    03:57
  • 46 - Session Attacks.mp4
    02:10
  • 47 - Additional Attacks.mp4
    03:29
  • 48 - Topic C Network Attacks.mp4
    00:23
  • 49 - Introduction to Network Attacks.mp4
    00:27
  • 50 - Wireless Network Attacks.mp4
    05:36
  • 51 - Layer 2 Attacks.mp4
    03:57
  • 52 - Service Attacks.mp4
    03:49
  • 53 - Demo DNS Poisoning.mp4
    04:33
  • 54 - Malicious Code.mp4
    01:45
  • 55 - Topic D Penetration Testing.mp4
    00:28
  • 56 - Penetration Testing.mp4
    01:16
  • 57 - Environment Types.mp4
    01:40
  • 58 - Pentesting Concepts.mp4
    02:50
  • 59 - Network Reconnaissance.mp4
    02:33
  • 60 - Exercise Types.mp4
    01:11
  • 61 - Chapter 2 Review.mp4
    00:47
  • 3 - Quiz 3.html
  • 62 - Architecture and Design.mp4
    01:07
  • 63 - Topic A Enterprise Security Architecture.mp4
    00:39
  • 64 - Enterprise Standardization Needs.mp4
    00:42
  • 65 - Configuration Management.mp4
    03:33
  • 66 - Data Protection.mp4
    04:38
  • 67 - Additional Security Concepts.mp4
    03:23
  • 68 - Disaster Recovery.mp4
    01:43
  • 69 - Deception and Disruption.mp4
    02:36
  • 70 - Topic B Designing Authentication and Authorization.mp4
    00:24
  • 71 - Authentication and Authorization.mp4
    01:46
  • 72 - Authentication Methods.mp4
    00:57
  • 73 - Authentication Technologies.mp4
    03:53
  • 74 - Biometrics.mp4
    02:40
  • 75 - Multifactor Authentication.mp4
    02:36
  • 76 - Demo Multifactor Authentication.mp4
    05:04
  • 77 - Topic C Designing Resiliency.mp4
    01:00
  • 78 - Resiliency and Cybersecurity.mp4
    02:19
  • 79 - Redundancy Concepts.mp4
    05:46
  • 80 - Replication Concepts.mp4
    02:12
  • 81 - Backup Concepts.mp4
    05:11
  • 82 - Additional Resiliency Options.mp4
    03:46
  • 83 - Topic D Cloud and Virtualization Concepts.mp4
    00:48
  • 84 - Cloud Models.mp4
    03:48
  • 85 - Cloud Types.mp4
    01:52
  • 86 - Cloud Service Providers.mp4
    01:23
  • 87 - Additional Cloud Concepts.mp4
    03:11
  • 88 - Additional Cloud Concepts cont.mp4
    05:15
  • 89 - Demo Cloud Computing Security.mp4
    03:28
  • 90 - Topic E Securing Application Development and Deployment.mp4
    00:42
  • 91 - Application Development Environments.mp4
    02:04
  • 92 - Secure Coding Techniques.mp4
    04:40
  • 93 - Automation Techniques.mp4
    01:59
  • 94 - Application Design Concepts.mp4
    02:16
  • 95 - Chapter 3 Review.mp4
    00:35
  • 4 - Quiz 4.html
  • 96 - Physical and System Security.mp4
    00:24
  • 97 - Topic A Physical Security Controls.mp4
    00:49
  • 98 - Importance of Physical Controls.mp4
    01:30
  • 99 - Standard Controls.mp4
    02:36
  • 100 - Security Monitoring.mp4
    01:35
  • 101 - Security Personnel.mp4
    03:02
  • 102 - Secure Areas.mp4
    03:13
  • 103 - Secure Data Destruction.mp4
    02:29
  • 104 - Demo Data Destruction Software.mp4
    02:15
  • 105 - Topic B Securing Embedded and Specialized Systems.mp4
    00:34
  • 106 - Embedded Systems.mp4
    02:00
  • 107 - Specialized Systems.mp4
    02:50
  • 108 - Additional System Types.mp4
    01:21
  • 109 - Communication Considerations.mp4
    01:37
  • 110 - Constraints.mp4
    02:09
  • 111 - Chapter 4 Review.mp4
    00:35
  • 5 - Quiz 5.html
  • 112 - Cryptography.mp4
    01:16
  • 113 - Topic A Cryptographic Concepts.mp4
    00:49
  • 114 - Introduction to Cryptography.mp4
    02:02
  • 115 - Common Use Cases.mp4
    02:48
  • 116 - Integrity Verification.mp4
    03:42
  • 117 - Understanding Keys.mp4
    06:10
  • 118 - Crypto Limitations.mp4
    05:08
  • 119 - Quantum.mp4
    02:57
  • 120 - Additional Cryptographic Types.mp4
    06:57
  • 121 - Topic B Public Key Infrastructures.mp4
    00:47
  • 122 - Introduction to PKIs.mp4
    01:14
  • 123 - Certificate Authorities.mp4
    02:35
  • 124 - Certificates.mp4
    05:42
  • 125 - Certificate Verification.mp4
    01:33
  • 126 - Certificate Formats.mp4
    02:13
  • 127 - Demo Implementing PKI.mp4
    06:42
  • 128 - Additional Concepts.mp4
    04:06
  • 129 - Chapter 5 Review.mp4
    00:32
  • 6 - Quiz 6.html
  • 130 - Implementing Secure Networks.mp4
    00:38
  • 131 - Topic A Implement Secure Protocols.mp4
    00:41
  • 132 - Network Protocols.mp4
    01:43
  • 133 - Use Cases.mp4
    03:40
  • 134 - Application Layer Protocols.mp4
    08:55
  • 135 - IP Security.mp4
    04:32
  • 136 - Topic B Implement Secure Network Designs.mp4
    00:53
  • 137 - Network Segmentation.mp4
    04:20
  • 138 - High Availability.mp4
    03:25
  • 139 - Virtual Private Networks.mp4
    04:22
  • 140 - Secure Network Appliances.mp4
    06:39
  • 141 - Firewalls.mp4
    07:02
  • 142 - Demo Configuring a HostBased Firewall.mp4
    07:14
  • 143 - Additional Network Security Concepts.mp4
    03:04
  • 144 - Topic C Implementing Security in the Cloud.mp4
    00:52
  • 145 - Cloud Security Controls.mp4
    03:07
  • 146 - Cloud Storage Security.mp4
    01:07
  • 147 - Cloud Network Security.mp4
    01:47
  • 148 - Compute Security.mp4
    02:12
  • 149 - Additional Cloud Solutions.mp4
    03:14
  • 150 - Topic D Implement Wireless Security.mp4
    00:42
  • 151 - Cryptographic Protocols.mp4
    03:40
  • 152 - Authentication Protocols.mp4
    03:02
  • 153 - Authentication Methods.mp4
    01:46
  • 154 - Installation Considerations.mp4
    03:17
  • 155 - Topic E Implement Secure Mobile Solutions.mp4
    01:14
  • 156 - Deployment Models.mp4
    03:32
  • 157 - Connection Methods and Receivers.mp4
    02:55
  • 158 - Mobile Device Management MDM.mp4
    05:15
  • 159 - Mobile Devices.mp4
    01:12
  • 160 - Enforcement and Monitoring.mp4
    02:38
  • 161 - Additional Controls.mp4
    01:36
  • 162 - Chapter 6 Review.mp4
    00:43
  • 7 - Quiz 7.html
  • 163 - Implementing Secure Hosts and Identities.mp4
    00:42
  • 164 - Topic A Implement Authentication and Authorization Systems.mp4
    00:33
  • 165 - Understanding Identity.mp4
    01:58
  • 166 - Access Control Methods.mp4
    06:55
  • 167 - Demo RoleBased Access Control.mp4
    05:58
  • 168 - Authentication Management.mp4
    03:22
  • 169 - Remote Access Authentication.mp4
    03:34
  • 170 - Authentication and Authorization Protocols.mp4
    04:58
  • 171 - Topic B Implement Identity and Account Management Controls.mp4
    00:19
  • 172 - Account Types.mp4
    03:16
  • 173 - Account Policies.mp4
    05:50
  • 174 - Demo Configuring Account Policies.mp4
    04:46
  • 175 - Additional Identity Terms.mp4
    02:04
  • 176 - Topic C Implement Host and Application Security Solutions.mp4
    00:42
  • 177 - Endpoint Protection.mp4
    00:50
  • 178 - Client Level Protections.mp4
    02:57
  • 179 - Network Level Protections.mp4
    01:30
  • 180 - Boot Integrity.mp4
    02:13
  • 181 - Database Security.mp4
    01:16
  • 182 - System Hardening.mp4
    02:02
  • 183 - Application Security.mp4
    03:29
  • 184 - Chapter 7 Review.mp4
    00:35
  • 8 - Quiz 8.html
  • 185 - Operational Procedures.mp4
    01:03
  • 186 - Topic A Using Tools to Assess Security.mp4
    00:43
  • 187 - Network Reconnaissance and Discovery.mp4
    01:34
  • 188 - Network Tools.mp4
    06:41
  • 189 - Network Tools cont.mp4
    04:59
  • 190 - Demo Using Network Tools.mp4
    07:25
  • 191 - File Manipulation Tools.mp4
    03:39
  • 192 - Packet Capture and Relay.mp4
    02:29
  • 193 - Shell and Script Environments.mp4
    03:21
  • 194 - Forensics Tools.mp4
    02:57
  • 195 - Topic B Utilizing Data Sources for Investigation.mp4
    00:35
  • 196 - Vulnerability Scan Output.mp4
    01:03
  • 197 - SIEM Dashboards.mp4
    02:44
  • 198 - Log Files.mp4
    04:03
  • 199 - Additional Monitoring.mp4
    01:16
  • 200 - Topic C Applying Mitigation Techniques.mp4
    00:49
  • 201 - Reconfiguring Endpoint Solutions.mp4
    02:33
  • 202 - Configuration Changes.mp4
    03:01
  • 203 - Additional Mitigation Techniques.mp4
    03:27
  • 204 - Chapter 8 Review.mp4
    00:49
  • 9 - Quiz 9.html
  • 205 - Incident Response and Forensics.mp4
    01:04
  • 206 - Topic A Incident Response Policies and Procedures.mp4
    00:42
  • 207 - Incident Response Plans.mp4
    01:18
  • 208 - Incident Response Process.mp4
    04:11
  • 209 - Exercises.mp4
    02:20
  • 210 - Attack Frameworks.mp4
    03:12
  • 211 - Additional Plans.mp4
    03:22
  • 212 - Demo Examining IRPs.mp4
    03:43
  • 213 - Topic B Understanding Digital Forensics.mp4
    00:40
  • 214 - Introduction to Forensics.mp4
    00:44
  • 215 - Evidence Categories.mp4
    01:16
  • 216 - Documentation and Evidence.mp4
    07:08
  • 217 - Acquisition Concepts.mp4
    04:10
  • 218 - Integrity.mp4
    01:37
  • 219 - Additional Concepts.mp4
    02:17
  • 220 - Chapter 9 Review.mp4
    00:39
  • 10 - Quiz 10.html
  • 221 - Governance Risk and Compliance.mp4
    01:02
  • 222 - Topic A Introduction to Control Types.mp4
    00:23
  • 223 - Security Controls.mp4
    00:34
  • 224 - Control Categories.mp4
    01:40
  • 225 - Control Types.mp4
    02:08
  • 226 - Topic B Understanding Governance.mp4
    00:53
  • 227 - Introduction to Governance.mp4
    01:00
  • 228 - Regulations and Standards.mp4
    02:06
  • 229 - Key Frameworks.mp4
    02:56
  • 230 - Benchmarks.mp4
    01:19
  • 231 - Demo Data Loss Prevention DLP.mp4
    06:19
  • 232 - Topic C Implementing Security Policies.mp4
    01:04
  • 233 - PersonnelBased Policies.mp4
    06:49
  • 234 - PersonnelBased Policies cont.mp4
    04:59
  • 235 - ThirdParty Risk Management.mp4
    04:09
  • 236 - Data.mp4
    01:03
  • 237 - Credential Policies.mp4
    01:29
  • 238 - Topic D Implementing Risk Management.mp4
    00:46
  • 239 - Risk Types.mp4
    02:32
  • 240 - Risk Management Strategies.mp4
    04:01
  • 241 - Risk Analysis.mp4
    03:32
  • 242 - Risk Analysis cont.mp4
    03:19
  • 243 - Disasters.mp4
    01:03
  • 244 - Business Impact Analysis.mp4
    03:00
  • 245 - Topic E Compliance with Privacy and Sensitive Data.mp4
    00:35
  • 246 - Organizational Consequences.mp4
    01:48
  • 247 - Data Types.mp4
    02:10
  • 248 - Privacy Enhancing Technologies.mp4
    01:35
  • 249 - Roles and Responsibilities.mp4
    01:12
  • 250 - Chapter 10 Review.mp4
    00:55
  • 251 - Course Closure.mp4
    02:55
  • 252 - Tokens.mp4
    01:27
  • 253 - Symmetric Encryption.mp4
    00:55
  • Description


    CompTIA Security+ (Exam SY0-601)

    What You'll Learn?


    • Understand threats, attacks, and vulnerabilities
    • Analyze attacks
    • Learn about enterprise security architecture
    • Design authentication and authorization
    • Understand cloud and virtualization concepts
    • Secure application development and deployment
    • Implement physical security controls
    • Secure embedded and specialized systems
    • Learn about cryptographic concepts
    • Implement public key infrastructures
    • Implement secure networks
    • Implement secure mobile solutions
    • Implement secure hosts and identities
    • Use tools to assess security
    • Utilize data sources for investigation
    • Apply mitigation techniques
    • Learn about incident response and forensics
    • Understand governance, risk, and compliance

    Who is this for?


  • Candidates looking to clear the CompTIA Security+ (SY0-601) certification exam
  • Information technology professionals
  • Information security personnel
  • Students of network and information security
  • Security analysts
  • SOC analysts and engineers
  • What You Need to Know?


  • The course starts with the basics of information and network security. Hence, no prior knowledge of information security is required. However, the candidates are expected to have a fair knowledge of basic networking and computing concepts such as system administration, network administration, TCP/IP, routing, switching etc.
  • In addition to this, the candidates are also recommended to have studied the CompTIA A+ certification course or possess the equivalent knowledge.
  • More details


    Description

    Information and network security has become an important topic of discussion in recent times and the focus of almost every organization on information and network security is increasing with each passing day. This is primarily due to increased reliance on digital systems for day-to-day operations. There is a substantial amount of data residing on the digital systems that lures hackers and state actors towards illegally accessing and using it for monetary benefits and other political reasons.

    This course prepares the candidates to appear in the CompTIA Security+ (SY0-601) exam. The CompTIA Security+ exam is a foundational exam for aspiring information security professionals and enables them to understand different threats, analyze attacks, learn cryptography, implement secure networks, devise operational procedures, perform forensic analysis and more to ensure integrity and protection of sensitive data.

    This course also provides the basis to build on the knowledge gained and advance towards other professional certifications in the field of information and network security. This can be a great career move for young IT professionals to explore the in-demand network and information security arena.

    The CompTIA Security+ is the premier vendor-neutral security certification. This preparatory course for the CompTIA Security+ certification exam assures that the students completely learn and understand the exam topics of the latest SY0-601 exam version. The students will be able to demonstrate their knowledge of security concepts, tools, and procedures. It also confirms their ability to react to security incidents, and validates their skills in anticipating security risks and guarding against them.

    Overall, the course is very well designed to give a detailed overview of network and information security concepts and practical implications to the students. This helps them to appear in the CompTIA Security+ exam as well as polish their skills to improve their productivity in their jobs.

    Who this course is for:

    • Candidates looking to clear the CompTIA Security+ (SY0-601) certification exam
    • Information technology professionals
    • Information security personnel
    • Students of network and information security
    • Security analysts
    • SOC analysts and engineers

    User Reviews
    Rating
    0
    0
    0
    0
    0
    average 0
    Total votes0
    Focused display
    Stone River eLearning
    Stone River eLearning
    Instructor's Courses
    At Stone River eLearning, technology is all we teach. If you're interested in IT, programming, development or design - we have it covered. Check out our huge catalog of courses and join the over 1,200,000+ students currently taking Stone River eLearning courses. We currently offer 1000+ different technology training courses on our Stone River eLearning website and are adding new courses on hot and trending topics every month. A subscription option is available for those with a real passion for learning.
    Students take courses primarily to improve job-related skills.Some courses generate credit toward technical certification. Udemy has made a special effort to attract corporate trainers seeking to create coursework for employees of their company.
    • language english
    • Training sessions 253
    • duration 10:47:47
    • English subtitles has
    • Release Date 2024/05/04