Companies Home Search Profile

CompTIA Security+ SY0-601

Focused View

23:06:51

72 View
  • 01-CompTIA Security+ SY0-601 - Introduction.mp4
    06:37
  • 02-Introduction to Module 1.mp4
    01:48
  • 03-Learning Objectives.mp4
    00:30
  • 04-1.1 Social Engineering Principles.mp4
    10:45
  • 05-1.2 Social Engineering Attack Vectors.mp4
    12:45
  • 06-1.3 Influence Campaigns.mp4
    09:26
  • 07-Closer Look Lab - Phone and Text Spoofing.mp4
    03:11
  • 08-Learning Objectives.mp4
    00:40
  • 09-2.1 Malware Primer.mp4
    12:04
  • 10-2.2 Malware Families.mp4
    11:13
  • 11-2.3 Password Attacks.mp4
    13:11
  • 12-2.4 Physical Attacks.mp4
    10:23
  • 13-2.5 Adversarial Artificial Intelligence.mp4
    07:54
  • 14-2.6 Indicators of Compromise.mp4
    08:46
  • 15-Closer Look Lab - Malware Analysis.mp4
    05:44
  • 16-Learning Objectives.mp4
    00:37
  • 17-3.1 Input and Output Validation.mp4
    08:12
  • 18-3.2 Injection, XSS and Forgery Attacks.mp4
    12:26
  • 19-3.3 System Attacks.mp4
    08:59
  • 20-Closer Look Lab - Constructing Error Messages.mp4
    05:22
  • 21-Learning Objectives.mp4
    00:36
  • 22-4.1 Digital Infrastructure Attacks.mp4
    12:00
  • 23-4.2 Wireless Attacks.mp4
    08:33
  • 24-4.3 Code or Script Execution.mp4
    09:31
  • 25-Closer Look Lab - Powershell.mp4
    06:22
  • 26-Learning Objectives.mp4
    00:38
  • 27-5.1 Threat Actors and Attributes.mp4
    12:07
  • 28-5.2 Threat Modeling.mp4
    06:55
  • 29-5.3 Threat Intelligence.mp4
    12:26
  • 30-Closer Look Lab - Threat Intelligence Workflow.mp4
    03:10
  • 31-Learning Objectives.mp4
    00:30
  • 32-6.1 Operational Vulnerabilities.mp4
    12:29
  • 33-6.2 Third-party Risks.mp4
    09:53
  • 34-Closer Look Lab - Zero Day Vulnerability.mp4
    04:15
  • 35-Learning Objectives.mp4
    00:30
  • 36-7.1 Threat Hunting and Vulnerability Identification.mp4
    12:58
  • 37-7.2 Syslog, SIEM, and SOAR.mp4
    10:04
  • 38-Closer Look Lab - Common Vulnerabilities and Exposures.mp4
    04:26
  • 39-Learning Objectives.mp4
    00:24
  • 40-8.1 Penetration Testing Concepts.mp4
    11:52
  • 41-8.2 Penetration Testing Techniques.mp4
    10:50
  • 42-Closer Look Lab - Passive Reconnaissance.mp4
    04:33
  • 43-Module 1 REVIEW.mp4
    16:54
  • 44-Introduction to Module 2.mp4
    01:30
  • 45-Learning Objectives.mp4
    00:30
  • 46-9.1 Configuration Management.mp4
    06:44
  • 47-9.2 Data Protection.mp4
    11:42
  • 48-9.3 Deception and Disruption.mp4
    06:50
  • 49-Closer Look Lab - Honeypots.mp4
    04:00
  • 50-Learning Objectives.mp4
    00:28
  • 51-10.1 Cloud Computing.mp4
    13:20
  • 52-10.2 Virtualization.mp4
    10:14
  • 53-Closer Look Lab - Virtualization.mp4
    04:11
  • 54-Learning Objectives.mp4
    00:35
  • 55-11.1 Secure Staging.mp4
    09:28
  • 56-11.2 Secure Coding Techniques.mp4
    10:10
  • 57-11.3 Automation.mp4
    07:38
  • 58-Closer Look Lab - Open Web Application Security Project (OWASP).mp4
    05:20
  • 59-Learning Objectives.mp4
    00:31
  • 60-12.1 Identity Management.mp4
    10:10
  • 61-12.2 Authentication Factors.mp4
    11:01
  • 62-12.3 Biometrics.mp4
    09:13
  • 63-Closer Look Lab - Pwned Passwords.mp4
    06:26
  • 64-Learning Objectives.mp4
    00:32
  • 65-13.1 Resiliency and Redundancy.mp4
    16:07
  • 66-13.2 Backup and Recovery.mp4
    13:10
  • 67-Closer Look Lab - RAID.mp4
    03:49
  • 68-Learning Objectives.mp4
    00:37
  • 69-14.1 Embedded Systems.mp4
    10:51
  • 70-14.2 Internet of Things.mp4
    07:27
  • 71-Closer Look Lab - Raspberry Pi.mp4
    02:37
  • 72-Learning Objectives.mp4
    00:36
  • 73-15.1 Site and Building Security.mp4
    13:15
  • 74-15.2 Environmental Controls.mp4
    11:26
  • 75-15.3 Secure Data Destruction.mp4
    08:12
  • 76-Closer Look Lab - Disk Wiping.mp4
    05:46
  • 77-Learning Objectives.mp4
    00:45
  • 78-16.1 Cryptography Primer.mp4
    12:15
  • 79-16.2 Steganography.mp4
    07:48
  • 80-16.3 Symmetric Encryption.mp4
    12:06
  • 81-16.4 Asymmetric Encryption.mp4
    13:37
  • 82-16.5 Hashing.mp4
    11:43
  • 83-16.6 Digital Signatures.mp4
    08:18
  • 84-16.7 Emerging Cryptography.mp4
    06:38
  • 85-Closer Look Lab - Hashing.mp4
    05:05
  • 86-Module 2 REVIEW.mp4
    14:53
  • 87-Introduction to Module 3.mp4
    01:36
  • 88-Learning Objectives.mp4
    00:38
  • 89-17.1 Secure Communications Protocols.mp4
    13:01
  • 90-17.2 Secure Network Protocols.mp4
    11:09
  • 91-Closer Look Lab - SSL TLS Packets.mp4
    07:27
  • 92-Learning Objectives.mp4
    00:29
  • 93-18.1 Trusted Computing Base.mp4
    11:57
  • 94-18.2 Endpoint Security.mp4
    08:58
  • 95-18.3 Database and Application Security.mp4
    10:08
  • 96-Closer Look Lab - Endpoint Firewall.mp4
    06:28
  • 97-Learning Objectives.mp4
    00:45
  • 98-19.1 Zones and Segments.mp4
    09:05
  • 99-19.2 Network Appliances.mp4
    12:23
  • 100-19.3 Firewalls.mp4
    14:33
  • 101-19.4 Virtual Private Networks.mp4
    07:54
  • 102-19.5 TCP IP.mp4
    11:16
  • 103-Closer Look Lab - IPv6 Addressing.mp4
    09:24
  • 104-Learning Objectives.mp4
    00:30
  • 105-20.1 Wireless Configuration.mp4
    10:36
  • 106-20.2 Wireless Design.mp4
    09:53
  • 107-Closer Look Lab - Wireless Heat Map.mp4
    05:04
  • 108-Learning Objectives.mp4
    00:34
  • 109-21.1 Mobile Connectivity.mp4
    10:09
  • 110-21.2 Mobile Device Management.mp4
    13:41
  • 111-Closer Look Lab - Mobile Device Ownership and Deployment Options.mp4
    03:13
  • 112-Learning Objectives.mp4
    00:40
  • 113-22.1 Cloud Infrastructure.mp4
    12:29
  • 114-22.2 Virtual Private Clouds.mp4
    07:06
  • 115-22.3 Cloud Security Controls.mp4
    11:05
  • 116-Closer Look Lab - CSA Cloud Controls Matrix.mp4
    06:20
  • 117-Learning Objectives.mp4
    00:26
  • 118-23.1 Identity and Access Management.mp4
    15:46
  • 119-Closer Look Lab - Sign-in Risk Triggers.mp4
    02:54
  • 120-Learning Objectives.mp4
    00:40
  • 121-24.1 Authentication Protocols.mp4
    15:21
  • 122-24.2 Federated Identity.mp4
    10:52
  • 123-24.3 Authorization and Access Control.mp4
    15:36
  • 124-Closer Look Lab - OAuth 2.0 in Action.mp4
    02:09
  • 125-Learning Objectives.mp4
    00:32
  • 126-25.1 PKI Cryptographic Review.mp4
    06:58
  • 127-25.2 Digital Certificates.mp4
    08:23
  • 128-25.3 Digital Certificate Lifecycle.mp4
    10:27
  • 129-25.4 Key Management.mp4
    08:07
  • 130-Closer Look Lab - Digital Certificates.mp4
    05:52
  • 131-Module 3 Review.mp4
    14:02
  • 132-Introduction to Module 4.mp4
    01:14
  • 133-Learning Objectives.mp4
    00:39
  • 134-26.1 Reconnaissance and Discovery.mp4
    15:28
  • 135-26.2 Packet Capture and NetFlows.mp4
    08:42
  • 136-26.3 Linux Commands.mp4
    08:22
  • 137-Closer Look Lab - ZenMap.mp4
    05:54
  • 138-Learning Objectives.mp4
    00:37
  • 139-27.1 Incident Response Plans.mp4
    14:33
  • 140-27.2 Incident Handling Process.mp4
    14:09
  • 141-Closer Look Lab - Mitre ATT&CK Framework.mp4
    03:00
  • 142-Learning Objectives.mp4
    00:30
  • 143-28.1 Data Sources.mp4
    13:58
  • 144-Closer Look Lab - Log Files.mp4
    04:57
  • 145-Learning Objectives.mp4
    00:32
  • 146-29.1 Incident Mitigation.mp4
    11:51
  • 147-Closer Look Lab - SOAR.mp4
    04:04
  • 148-Learning Objectives.mp4
    00:31
  • 149-30.1 Forensic Evidence.mp4
    13:24
  • 150-30.2 Forensic Examination.mp4
    15:29
  • 151-30.3 Disclosure and Notification.mp4
    09:42
  • 152-Closer Look Lab - RAM Capture.mp4
    04:06
  • 153-Module 4 Review.mp4
    13:17
  • 154-Introduction to Module 5.mp4
    01:39
  • 155-Learning Objectives.mp4
    00:33
  • 156-31.1 Controls and Countermeasures.mp4
    14:49
  • 157-Closer Look Lab - Overlapping Control Categories.mp4
    04:09
  • 158-Learning Objectives.mp4
    00:44
  • 159-32.1 Compliance and Regulations.mp4
    12:22
  • 160-32.2 Frameworks and Guidance.mp4
    13:00
  • 161-32.3 Benchmarks and Audit Standards.mp4
    11:33
  • 162-Closer Look Lab - CIS Benchmarks.mp4
    04:35
  • 163-Learning Objectives.mp4
    00:35
  • 164-33.1 Governance and Policies.mp4
    10:26
  • 165-33.2 Personnel Policies.mp4
    12:21
  • 166-33.3 Personnel Practices.mp4
    14:39
  • 167-33.4 Organizational Policies.mp4
    12:43
  • 168-33.5 Third-party Risk Management.mp4
    09:22
  • 169-Closer Look Lab - Policy & Standards.mp4
    08:05
  • 170-Learning Objectives.mp4
    00:32
  • 171-34.1 Risk Management.mp4
    13:44
  • 172-34.2 Risk Assessment.mp4
    13:34
  • 173-34.3 Business Continuity.mp4
    11:29
  • 174-Closer Look Lab - Quantitative Risk Assessment.mp4
    05:29
  • 175-Learning Objectives.mp4
    00:32
  • 176-35.1 Privacy Principles.mp4
    11:48
  • 177-35.2 Privacy Management.mp4
    12:12
  • 178-Closer Look Lab - Privacy Walkthrough.mp4
    04:21
  • 179-Learning Objectives.mp4
    00:36
  • 180-36.1 Understanding the Security+ Exam Structure.mp4
    02:32
  • 181-36.2 Study Strategies.mp4
    02:54
  • 182-36.3 Test Taking Strategies.mp4
    04:08
  • 183-36.4 Testing Options.mp4
    02:00
  • 184-36.5 Attaining and Maintaining Your Security+ Certification.mp4
    01:19
  • 185-Module 5 Review.mp4
    15:17
  • 186-CompTIA Security+ SY0-601 - Summary.mp4
    01:11
  • More details


    User Reviews
    Rating
    0
    0
    0
    0
    0
    average 0
    Total votes0
    Focused display
    Pearson's video training library is an indispensable learning tool for today's competitive job market. Having essential technology training and certifications can open doors for career advancement and life enrichment. We take learning personally. We've published hundreds of up-to-date videos on wide variety of key topics for Professionals and IT Certification candidates. Now you can learn from renowned industry experts from anywhere in the world, without leaving home.
    • language english
    • Training sessions 186
    • duration 23:06:51
    • Release Date 2023/11/07