Companies Home Search Profile

CompTIA Security+ SY0-601 Lab Course with Simulations/PBQ

Focused View

TIA Education, Andrew Ramdayal

24:22:20

209 View
  • 1 - About Me.mp4
    01:28
  • 2 - Exam Information.mp4
    06:05
  • 3 - My Experience Taking the Exam.mp4
    04:27
  • 4 - Building a lab.mp4
    07:52
  • 5 - Join me for a Live Q and A Session.mp4
    02:32
  • 6 - MUST WATCH Exam Objectives and layout of this course.mp4
    06:49
  • 6 - comptia-security-sy0-501-exam-objectives.pdf
  • 6 - comptia-security-sy0-601-exam-objectives-1-0.pdf
  • 7 - CIA Triade.mp4
    04:48
  • 8 - IAAA.mp4
    05:19
  • 9 - Basic security controls.mp4
    02:30
  • 10 - Phishing Smishing Vishing Spear phishing Whaling.mp4
    10:35
  • 11 - Dumpster diving and Shoulder surfing.mp4
    04:31
  • 12 - Eliciting information and the principles of social engineering.mp4
    09:05
  • 13 - Pharming.mp4
    07:23
  • 14 - Spam.mp4
    04:07
  • 15 - Tailgating.mp4
    03:01
  • 16 - Other types Social Engineer techniques.mp4
    14:53
  • 17 - Introduction to Malware.mp4
    01:52
  • 18 - Ransomeware and Cryptomalware.mp4
    06:48
  • 19 - Trojans and RATs.mp4
    06:27
  • 20 - Bot and Command and control.mp4
    03:48
  • 21 - Fileless Virus Logic bombs spyware rootkit backdoor.mp4
    05:04
  • 22 - Adversarial artificial intelligence AI.mp4
    06:06
  • 23 - Malicious USB cables drives and Card Cloning.mp4
    04:17
  • 24 - Supply chain attacks.mp4
    04:01
  • 25 - Keyloggers.mp4
    16:14
  • 26 - How passwords are stored.mp4
    05:25
  • 27 - Using hashcat to crack passwords.mp4
    07:16
  • 28 - Using a brute force and rainbow tables to attack passwords.mp4
    11:25
  • 29 - Privilege escalation SSL stripping Pass the hash.mp4
    10:46
  • 30 - Crosssite scripting XSS and Injections.mp4
    16:29
  • 31 - Pointer Dereference directory traversal buffer overflows and tocttou.mp4
    12:03
  • 32 - Replay attacks.mp4
    03:36
  • 33 - Request forgeries.mp4
    08:51
  • 34 - API Attacks.mp4
    06:33
  • 35 - Driver manipulation.mp4
    04:34
  • 36 - Integer overflow Resource exhaustion Memory leak.mp4
    05:35
  • 37 - Evil Twin and Rouge Access Point.mp4
    05:48
  • 38 - Bluesnarfing and Bluejacking.mp4
    03:25
  • 39 - Cracking WEP.mp4
    10:02
  • 40 - Disassociation and Jamming.mp4
    06:38
  • 41 - Man in the Middle browser and APR Poisoning.mp4
    18:41
  • 42 - IV RFID NFC Attacks.mp4
    06:10
  • 43 - MAC Flooding and Cloning.mp4
    05:54
  • 44 - DDOS Attacks.mp4
    07:38
  • 45 - Malicious Code.mp4
    04:16
  • 46 - Actors and threats.mp4
    13:20
  • 47 - Threat intelligence sources.mp4
    16:39
  • 48 - Research sources.mp4
    10:47
  • 49 - Cloudbased vs onpremises Zero Day.mp4
    10:29
  • 50 - Weak configurations.mp4
    09:09
  • 51 - Thirdparty risks Improper or weak patch legacy platforms.mp4
    10:15
  • 52 - Impacts.mp4
    05:41
  • 53 - Threat hunting.mp4
    04:26
  • 54 - Vulnerability scans.mp4
    17:53
  • 55 - SIEM and SOAR.mp4
    13:03
  • 56 - Penetration testing.mp4
    14:13
  • 57 - Passive and active reconnaissance.mp4
    04:03
  • 58 - Exercise types.mp4
    04:08
  • 59 - Configuration management.mp4
    11:46
  • 60 - Data Sovereignty and Protection.mp4
    11:49
  • 61 - Other Security Consideration.mp4
    13:07
  • 62 - Site Resiliency Hot Warm Cold.mp4
    05:53
  • 63 - Deception and disruption.mp4
    06:04
  • 64 - IaaS.mp4
    10:41
  • 65 - PaaS.mp4
    04:43
  • 66 - SaaS XaaS.mp4
    04:35
  • 67 - Cloud Deployment.mp4
    01:50
  • 68 - Cloud Application terms.mp4
    20:47
  • 69 - IaC.mp4
    13:09
  • 70 - Virtualization Issues.mp4
    04:59
  • 71 - Software Development Environment.mp4
    03:19
  • 72 - Secure Coding Techniques.mp4
    19:10
  • 73 - DevOps and Automation.mp4
    09:11
  • 74 - Authentication methods.mp4
    10:47
  • 75 - Biometrics.mp4
    08:57
  • 76 - MFA.mp4
    04:58
  • 77 - Authentication authorization and accounting.mp4
    03:22
  • 78 - Redundancy.mp4
    09:10
  • 79 - Replication and storages.mp4
    08:34
  • 80 - Backup Types.mp4
    14:09
  • 81 - Nonpersistence high availability diversity.mp4
    06:29
  • 82 - RAID.mp4
    16:04
  • 83 - Embedded Systems.mp4
    04:21
  • 84 - Industrial control system.mp4
    03:42
  • 85 - IoT.mp4
    04:25
  • 86 - IoT Communication and considerations.mp4
    06:46
  • 87 - Physical Security Controls.mp4
    09:20
  • 88 - Other physical security controls.mp4
    06:45
  • 89 - Locks and Fencings.mp4
    06:33
  • 90 - Fire Suppression.mp4
    03:01
  • 91 - Secure data destruction.mp4
    05:33
  • 92 - Introduction to cryptography.mp4
    03:48
  • 93 - Goals of cryptography.mp4
    05:30
  • 94 - Algorithm and Keys.mp4
    19:31
  • 95 - Block and stream ciphers.mp4
    03:48
  • 96 - Symmetric Ciphers.mp4
    09:17
  • 97 - Asymmetric Ciphers.mp4
    09:59
  • 98 - Hashing.mp4
    12:32
  • 99 - Hybrid cryptography.mp4
    09:19
  • 100 - Digital signatures.mp4
    06:09
  • 101 - Block Chain.mp4
    07:02
  • 102 - Steganography.mp4
    07:47
  • 103 - Key stretching.mp4
    02:28
  • 104 - Salting.mp4
    05:34
  • 105 - Quantum.mp4
    03:21
  • 106 - Ephemeral PFS Homomorphic.mp4
    03:11
  • 107 - Cipher Modes.mp4
    04:36
  • 108 - Lightweight cryptography.mp4
    02:52
  • 109 - Ellipticcurve cryptography.mp4
    02:54
  • 110 - Cipher suites.mp4
    01:45
  • 111 - Common use cases.mp4
    03:29
  • 112 - Limitations of encryptions.mp4
    04:10
  • 113 - DNSSEC.mp4
    03:53
  • 114 - Email security with SMIME and PMP.mp4
    05:07
  • 115 - Installing Wireshark on Windows 10.mp4
    08:17
  • 116 - Install and setup an FTP Server and Client.mp4
    10:24
  • 117 - Using Wireshark to capture an FTP Password and securing FTP Server.mp4
    09:07
  • 118 - Lightweight Directory Access Protocol Over SSL.mp4
    05:18
  • 119 - SRPT FTPS SFTP SNMP IMAP.mp4
    05:38
  • 120 - SSH.mp4
    05:07
  • 121 - VPN and IPSEC.mp4
    20:32
  • 122 - Use Cases for secure protocols.mp4
    04:37
  • 123 - Endpoint Protection.mp4
    05:24
  • 124 - Boot integrity.mp4
    03:16
  • 125 - Databases.mp4
    02:25
  • 126 - Application Security.mp4
    09:37
  • 127 - Hardening systems.mp4
    05:52
  • 128 - Drive Encryption and sandboxing.mp4
    09:12
  • 129 - Load Balancing.mp4
    06:30
  • 130 - Network segmentation.mp4
    06:57
  • 131 - How to download and install packet tracer.mp4
    08:43
  • 132 - VLANs and Port Security.mp4
    18:15
  • 133 - Firewalls.mp4
    12:51
  • 134 - Configuring firewall rules.mp4
    10:53
  • 135 - Jump and Proxy servers.mp4
    03:45
  • 136 - IDS and IPS.mp4
    09:09
  • 137 - Other network secure concepts.mp4
    08:04
  • 138 - Wireless Security.mp4
    16:40
  • 139 - Wireless Installation Considerations.mp4
    04:33
  • 140 - Mobile Connection methods and receivers.mp4
    02:39
  • 141 - Mobile device management MDM.mp4
    04:55
  • 142 - UEM and MAM.mp4
    04:08
  • 143 - Enforcement and monitoring of mobile devices.mp4
    06:38
  • 144 - Mobile Deployment Models.mp4
    04:19
  • 145 - Cloud Solutions controls.mp4
    02:58
  • 146 - Cloud Network and computing.mp4
    04:38
  • 147 - Cloud Security terms.mp4
    06:30
  • 148 - Identity and account types.mp4
    05:11
  • 149 - Account policies.mp4
    12:17
  • 150 - Authentication management.mp4
    04:27
  • 151 - Authentication Protocols.mp4
    19:13
  • 152 - Access control schemes.mp4
    13:53
  • 153 - Introduction to PKI.mp4
    04:59
  • 154 - Process of getting a certificate.mp4
    07:07
  • 155 - PKI Setup.mp4
    16:30
  • 156 - Fields on a certificate.mp4
    07:16
  • 157 - Certificate formats.mp4
    02:29
  • 158 - Certificate types.mp4
    06:15
  • 159 - Introductions to commands.mp4
    01:57
  • 160 - ARP and Route.mp4
    02:45
  • 161 - hping.mp4
    05:35
  • 162 - Curl.mp4
    04:04
  • 163 - IP scanner.mp4
    03:05
  • 164 - ipconfig ping tracert.mp4
    04:14
  • 165 - Linux file manipulation head tail cat.mp4
    05:11
  • 166 - Log.mp4
    02:47
  • 167 - Cuckoo.mp4
    01:04
  • 168 - thehavester.mp4
    02:14
  • 169 - Nslookup and Dig.mp4
    01:36
  • 170 - tcpdump.mp4
    03:32
  • 171 - NetCat.mp4
    02:04
  • 172 - Sniper.mp4
    04:56
  • 173 - scanless.mp4
    01:43
  • 174 - nmap.mp4
    04:20
  • 175 - Managing Linux Permissions.mp4
    15:54
  • 176 - Shell and script environments.mp4
    01:44
  • 177 - Exploitation frameworks.mp4
    03:43
  • 178 - Forensics tools.mp4
    06:44
  • 179 - Incident response process.mp4
    07:38
  • 180 - Attack Frameworks.mp4
    05:16
  • 181 - Incidents plans and exercises.mp4
    05:53
  • 182 - Log Files.mp4
    06:56
  • 183 - Capture log files.mp4
    07:22
  • 184 - Incident mitigation techniques.mp4
    07:31
  • 185 - Documentation and evidence.mp4
    06:00
  • 186 - Integrity of evidence.mp4
    05:24
  • 187 - Order of volatility.mp4
    04:38
  • 188 - Control Types and category.mp4
    06:00
  • 189 - Regulations standards and legislation.mp4
    05:13
  • 190 - Key frameworks.mp4
    15:01
  • 191 - Secure configuration guides.mp4
    02:04
  • 192 - Personnel Controls.mp4
    14:48
  • 193 - Thirdparty risk management.mp4
    05:36
  • 194 - Credential and organizations policies.mp4
    06:57
  • 195 - Risk types terms and Process.mp4
    12:23
  • 196 - Risk management strategies.mp4
    05:53
  • 197 - Risk Assessments.mp4
    08:50
  • 198 - Business impact analysis.mp4
    08:12
  • 199 - Privacy breaches.mp4
    04:01
  • 200 - Data types.mp4
    05:41
  • 201 - Privacy technologies and roles.mp4
    06:37
  • 202 - Performance Based Questions Introduction.mp4
    01:14
  • 203 - PBQ Attack Types and Response.mp4
    02:25
  • 204 - PBQ Incident Response.mp4
    01:49
  • 205 - PBQ Social Engineering.mp4
    01:42
  • 206 - PBQ Firewalls.mp4
    03:37
  • 207 - The End.mp4
    03:45
  • Description


    Pass your Security+ SY0-601 exam on the first try with a lab base approach to learning. Tons of labs.

    What You'll Learn?


    • CompTIA Security+ exam objectives
    • Attacks against networks
    • Methods to protect a network
    • Full length Mock Exam
    • Introduction to ethical hacking

    Who is this for?


  • Anyone looking to get CompTIA Security+ Certified
  • More details


    Description

    This course will prepare you to pass the CompTIA Security+ SY0-601 exam on the first try. In this course I will be using my 20+ years of experience teaching IT courses to give you a practical hands-on approach to all of the CompTIA Security+ Certification exam. I will cover all of the exam objectives in details.

    I am a best-selling author that have sold over 150,000 books in project management and IT service management. I have helped thousands of students to pass their certification exam over the last 20 years. My method of teaching is engaging and fun.

    I will review how to build your own lab to follow along with me in this journey so you can gain the practical knowledge needed not only to pass your Security+ exam but also how to apply it in the real world of being an IT technician.

    This course will cover the following domains:

    • Attacks, Threats, and Vulnerabilities

    • Architecture and Design

    • Implementation

    • Operations and Incident Response

    • Governance, Risk, and Compliance

    This course will include:

    • Over 200 lectures.

    • Over 24 Hours of training.

    • We will only be covering the topics on your exam, no nonsense and personal stories.

    • PDF of the exam objectives from CompTIA for the Security+ exam.

    • Certificate of completion.

    • Lifetime access.

    • 30-day money-back guarantee.


    Who this course is for:

    • Anyone looking to get CompTIA Security+ Certified

    User Reviews
    Rating
    0
    0
    0
    0
    0
    average 0
    Total votes0
    Focused display
    TIA Education, Andrew Ramdayal
    TIA Education, Andrew Ramdayal
    Instructor's Courses
    Andrew Ramdayal, PMP, PgMP, PMI-ACP, CISSP-ISSMP has over 15 years of project management experience in IT. He holds over 60 professional certifications in IT and accounting from vendors such as Microsoft, Cisco, CompTIA, and PMI. He also holds a Master's Degree in Management Information systems with a minor in project management. Andrew has worked on many ERP, IT Security, and computer networking projects over his career.Andrew has been teaching the PMP and information security courses for over 18 years to thousands of students all over the world. His unique teaching methods have allowed his students not only to pass the exam but also to apply the concepts in real life.
    Students take courses primarily to improve job-related skills.Some courses generate credit toward technical certification. Udemy has made a special effort to attract corporate trainers seeking to create coursework for employees of their company.
    • language english
    • Training sessions 207
    • duration 24:22:20
    • English subtitles has
    • Release Date 2023/06/08