CompTIA Security+ SY0-601
Focused View
23:06:51
72 View
01-CompTIA Security+ SY0-601 - Introduction.mp4
06:37
02-Introduction to Module 1.mp4
01:48
03-Learning Objectives.mp4
00:30
04-1.1 Social Engineering Principles.mp4
10:45
05-1.2 Social Engineering Attack Vectors.mp4
12:45
06-1.3 Influence Campaigns.mp4
09:26
07-Closer Look Lab - Phone and Text Spoofing.mp4
03:11
08-Learning Objectives.mp4
00:40
09-2.1 Malware Primer.mp4
12:04
10-2.2 Malware Families.mp4
11:13
11-2.3 Password Attacks.mp4
13:11
12-2.4 Physical Attacks.mp4
10:23
13-2.5 Adversarial Artificial Intelligence.mp4
07:54
14-2.6 Indicators of Compromise.mp4
08:46
15-Closer Look Lab - Malware Analysis.mp4
05:44
16-Learning Objectives.mp4
00:37
17-3.1 Input and Output Validation.mp4
08:12
18-3.2 Injection, XSS and Forgery Attacks.mp4
12:26
19-3.3 System Attacks.mp4
08:59
20-Closer Look Lab - Constructing Error Messages.mp4
05:22
21-Learning Objectives.mp4
00:36
22-4.1 Digital Infrastructure Attacks.mp4
12:00
23-4.2 Wireless Attacks.mp4
08:33
24-4.3 Code or Script Execution.mp4
09:31
25-Closer Look Lab - Powershell.mp4
06:22
26-Learning Objectives.mp4
00:38
27-5.1 Threat Actors and Attributes.mp4
12:07
28-5.2 Threat Modeling.mp4
06:55
29-5.3 Threat Intelligence.mp4
12:26
30-Closer Look Lab - Threat Intelligence Workflow.mp4
03:10
31-Learning Objectives.mp4
00:30
32-6.1 Operational Vulnerabilities.mp4
12:29
33-6.2 Third-party Risks.mp4
09:53
34-Closer Look Lab - Zero Day Vulnerability.mp4
04:15
35-Learning Objectives.mp4
00:30
36-7.1 Threat Hunting and Vulnerability Identification.mp4
12:58
37-7.2 Syslog, SIEM, and SOAR.mp4
10:04
38-Closer Look Lab - Common Vulnerabilities and Exposures.mp4
04:26
39-Learning Objectives.mp4
00:24
40-8.1 Penetration Testing Concepts.mp4
11:52
41-8.2 Penetration Testing Techniques.mp4
10:50
42-Closer Look Lab - Passive Reconnaissance.mp4
04:33
43-Module 1 REVIEW.mp4
16:54
44-Introduction to Module 2.mp4
01:30
45-Learning Objectives.mp4
00:30
46-9.1 Configuration Management.mp4
06:44
47-9.2 Data Protection.mp4
11:42
48-9.3 Deception and Disruption.mp4
06:50
49-Closer Look Lab - Honeypots.mp4
04:00
50-Learning Objectives.mp4
00:28
51-10.1 Cloud Computing.mp4
13:20
52-10.2 Virtualization.mp4
10:14
53-Closer Look Lab - Virtualization.mp4
04:11
54-Learning Objectives.mp4
00:35
55-11.1 Secure Staging.mp4
09:28
56-11.2 Secure Coding Techniques.mp4
10:10
57-11.3 Automation.mp4
07:38
58-Closer Look Lab - Open Web Application Security Project (OWASP).mp4
05:20
59-Learning Objectives.mp4
00:31
60-12.1 Identity Management.mp4
10:10
61-12.2 Authentication Factors.mp4
11:01
62-12.3 Biometrics.mp4
09:13
63-Closer Look Lab - Pwned Passwords.mp4
06:26
64-Learning Objectives.mp4
00:32
65-13.1 Resiliency and Redundancy.mp4
16:07
66-13.2 Backup and Recovery.mp4
13:10
67-Closer Look Lab - RAID.mp4
03:49
68-Learning Objectives.mp4
00:37
69-14.1 Embedded Systems.mp4
10:51
70-14.2 Internet of Things.mp4
07:27
71-Closer Look Lab - Raspberry Pi.mp4
02:37
72-Learning Objectives.mp4
00:36
73-15.1 Site and Building Security.mp4
13:15
74-15.2 Environmental Controls.mp4
11:26
75-15.3 Secure Data Destruction.mp4
08:12
76-Closer Look Lab - Disk Wiping.mp4
05:46
77-Learning Objectives.mp4
00:45
78-16.1 Cryptography Primer.mp4
12:15
79-16.2 Steganography.mp4
07:48
80-16.3 Symmetric Encryption.mp4
12:06
81-16.4 Asymmetric Encryption.mp4
13:37
82-16.5 Hashing.mp4
11:43
83-16.6 Digital Signatures.mp4
08:18
84-16.7 Emerging Cryptography.mp4
06:38
85-Closer Look Lab - Hashing.mp4
05:05
86-Module 2 REVIEW.mp4
14:53
87-Introduction to Module 3.mp4
01:36
88-Learning Objectives.mp4
00:38
89-17.1 Secure Communications Protocols.mp4
13:01
90-17.2 Secure Network Protocols.mp4
11:09
91-Closer Look Lab - SSL TLS Packets.mp4
07:27
92-Learning Objectives.mp4
00:29
93-18.1 Trusted Computing Base.mp4
11:57
94-18.2 Endpoint Security.mp4
08:58
95-18.3 Database and Application Security.mp4
10:08
96-Closer Look Lab - Endpoint Firewall.mp4
06:28
97-Learning Objectives.mp4
00:45
98-19.1 Zones and Segments.mp4
09:05
99-19.2 Network Appliances.mp4
12:23
100-19.3 Firewalls.mp4
14:33
101-19.4 Virtual Private Networks.mp4
07:54
102-19.5 TCP IP.mp4
11:16
103-Closer Look Lab - IPv6 Addressing.mp4
09:24
104-Learning Objectives.mp4
00:30
105-20.1 Wireless Configuration.mp4
10:36
106-20.2 Wireless Design.mp4
09:53
107-Closer Look Lab - Wireless Heat Map.mp4
05:04
108-Learning Objectives.mp4
00:34
109-21.1 Mobile Connectivity.mp4
10:09
110-21.2 Mobile Device Management.mp4
13:41
111-Closer Look Lab - Mobile Device Ownership and Deployment Options.mp4
03:13
112-Learning Objectives.mp4
00:40
113-22.1 Cloud Infrastructure.mp4
12:29
114-22.2 Virtual Private Clouds.mp4
07:06
115-22.3 Cloud Security Controls.mp4
11:05
116-Closer Look Lab - CSA Cloud Controls Matrix.mp4
06:20
117-Learning Objectives.mp4
00:26
118-23.1 Identity and Access Management.mp4
15:46
119-Closer Look Lab - Sign-in Risk Triggers.mp4
02:54
120-Learning Objectives.mp4
00:40
121-24.1 Authentication Protocols.mp4
15:21
122-24.2 Federated Identity.mp4
10:52
123-24.3 Authorization and Access Control.mp4
15:36
124-Closer Look Lab - OAuth 2.0 in Action.mp4
02:09
125-Learning Objectives.mp4
00:32
126-25.1 PKI Cryptographic Review.mp4
06:58
127-25.2 Digital Certificates.mp4
08:23
128-25.3 Digital Certificate Lifecycle.mp4
10:27
129-25.4 Key Management.mp4
08:07
130-Closer Look Lab - Digital Certificates.mp4
05:52
131-Module 3 Review.mp4
14:02
132-Introduction to Module 4.mp4
01:14
133-Learning Objectives.mp4
00:39
134-26.1 Reconnaissance and Discovery.mp4
15:28
135-26.2 Packet Capture and NetFlows.mp4
08:42
136-26.3 Linux Commands.mp4
08:22
137-Closer Look Lab - ZenMap.mp4
05:54
138-Learning Objectives.mp4
00:37
139-27.1 Incident Response Plans.mp4
14:33
140-27.2 Incident Handling Process.mp4
14:09
141-Closer Look Lab - Mitre ATT&CK Framework.mp4
03:00
142-Learning Objectives.mp4
00:30
143-28.1 Data Sources.mp4
13:58
144-Closer Look Lab - Log Files.mp4
04:57
145-Learning Objectives.mp4
00:32
146-29.1 Incident Mitigation.mp4
11:51
147-Closer Look Lab - SOAR.mp4
04:04
148-Learning Objectives.mp4
00:31
149-30.1 Forensic Evidence.mp4
13:24
150-30.2 Forensic Examination.mp4
15:29
151-30.3 Disclosure and Notification.mp4
09:42
152-Closer Look Lab - RAM Capture.mp4
04:06
153-Module 4 Review.mp4
13:17
154-Introduction to Module 5.mp4
01:39
155-Learning Objectives.mp4
00:33
156-31.1 Controls and Countermeasures.mp4
14:49
157-Closer Look Lab - Overlapping Control Categories.mp4
04:09
158-Learning Objectives.mp4
00:44
159-32.1 Compliance and Regulations.mp4
12:22
160-32.2 Frameworks and Guidance.mp4
13:00
161-32.3 Benchmarks and Audit Standards.mp4
11:33
162-Closer Look Lab - CIS Benchmarks.mp4
04:35
163-Learning Objectives.mp4
00:35
164-33.1 Governance and Policies.mp4
10:26
165-33.2 Personnel Policies.mp4
12:21
166-33.3 Personnel Practices.mp4
14:39
167-33.4 Organizational Policies.mp4
12:43
168-33.5 Third-party Risk Management.mp4
09:22
169-Closer Look Lab - Policy & Standards.mp4
08:05
170-Learning Objectives.mp4
00:32
171-34.1 Risk Management.mp4
13:44
172-34.2 Risk Assessment.mp4
13:34
173-34.3 Business Continuity.mp4
11:29
174-Closer Look Lab - Quantitative Risk Assessment.mp4
05:29
175-Learning Objectives.mp4
00:32
176-35.1 Privacy Principles.mp4
11:48
177-35.2 Privacy Management.mp4
12:12
178-Closer Look Lab - Privacy Walkthrough.mp4
04:21
179-Learning Objectives.mp4
00:36
180-36.1 Understanding the Security+ Exam Structure.mp4
02:32
181-36.2 Study Strategies.mp4
02:54
182-36.3 Test Taking Strategies.mp4
04:08
183-36.4 Testing Options.mp4
02:00
184-36.5 Attaining and Maintaining Your Security+ Certification.mp4
01:19
185-Module 5 Review.mp4
15:17
186-CompTIA Security+ SY0-601 - Summary.mp4
01:11
More details
User Reviews
Rating
average 0
Focused display

LiveLessons
View courses LiveLessonsPearson's video training library is an indispensable learning tool for today's competitive job market. Having essential technology training and certifications can open doors for career advancement and life enrichment. We take learning personally. We've published hundreds of up-to-date videos on wide variety of key topics for Professionals and IT Certification candidates. Now you can learn from renowned industry experts from anywhere in the world, without leaving home.
- language english
- Training sessions 186
- duration 23:06:51
- Release Date 2023/11/07