Companies Home Search Profile

CompTIA Security+ SY0-701

Focused View

27:22:50

31 View
  • 001. CompTIA Security+ SY0-701 Introduction.mp4
    07:00
  • 001. Learning objectives.mp4
    00:30
  • 002. 1.1 Control Objectives.mp4
    17:52
  • 003. 1.2 Control Categories and Classifications.mp4
    11:25
  • 004. 1.3 Deep Dive Quiz.mp4
    08:20
  • 001. Learning objectives.mp4
    00:34
  • 002. 2.1 Security and Privacy Principles.mp4
    11:03
  • 003. 2.2 Zero Trust.mp4
    13:07
  • 004. 2.3 Physical Security.mp4
    15:38
  • 005. 2.4 Environmental Impact.mp4
    12:24
  • 006. 2.5 Deception and Disruption.mp4
    09:09
  • 007. 2.6 Deep Dive Quiz.mp4
    16:11
  • 001. Learning objectives.mp4
    00:29
  • 002. 3.1 Configuration Management.mp4
    11:32
  • 003. 3.2 Change Management.mp4
    12:16
  • 004. 3.3 Deep Dive Quiz.mp4
    09:05
  • 001. Learning objectives.mp4
    00:56
  • 002. 4.1 Cryptography Primer.mp4
    14:48
  • 003. 4.2 Encryption.mp4
    20:50
  • 004. 4.3 Hashing and Digital Signatures.mp4
    15:27
  • 005. 4.4 Digital Certificates.mp4
    11:19
  • 006. 4.5 Emerging Cryptography.mp4
    07:50
  • 007. 4.6 Steganography.mp4
    07:02
  • 008. 4.7 Deep Dive Quiz.mp4
    14:34
  • 001. Learning objectives.mp4
    00:31
  • 002. 5.1 Threat Actors and Attributes.mp4
    15:01
  • 003. 5.2 Threat Modeling and Intelligence.mp4
    10:05
  • 004. 5.3 Deep Dive Quiz.mp4
    06:43
  • 001. Learning objectives.mp4
    00:34
  • 002. 6.1 Operational Threat Vectors.mp4
    13:45
  • 003. 6.2 Third-Party and Supply Chain Threat Vectors.mp4
    14:55
  • 004. 6.3 Social Engineering.mp4
    20:27
  • 005. 6.4 Deep Dive Quiz.mp4
    08:06
  • 001. Learning objectives.mp4
    00:31
  • 002. 7.1 Vulnerability Primer.mp4
    09:38
  • 003. 7.2 Network, OS, and Cloud Vulnerabilities.mp4
    10:24
  • 004. 7.3 Deep Dive Quiz.mp4
    08:37
  • 001. Learning objectives.mp4
    00:38
  • 002. 8.1 Indicators of Malicious Activity.mp4
    08:17
  • 003. 8.2 Malware Attacks.mp4
    13:00
  • 004. 8.3 Brute Force Attacks.mp4
    09:32
  • 005. 8.4 Digital Infrastructure Attacks.mp4
    12:14
  • 006. 8.5 Application Attacks.mp4
    11:50
  • 007. 8.6 Wireless Attacks.mp4
    10:14
  • 008. 8.7 Cryptographic Attacks.mp4
    14:43
  • 009. 8.8 Deep Dive Quiz.mp4
    14:12
  • 001. Learning objectives.mp4
    00:53
  • 002. 9.1 Secure Design Principles.mp4
    11:32
  • 003. 9.2 Segmentation.mp4
    10:43
  • 004. 9.3 Deep Dive Quiz.mp4
    08:34
  • 001. Learning objectives.mp4
    00:39
  • 002. 10.1 Computing Architecture Models.mp4
    10:53
  • 003. 10.2 Cloud Services.mp4
    17:36
  • 004. 10.3 Cloud Infrastructure.mp4
    12:05
  • 005. 10.4 Data Center Solution Elements.mp4
    12:18
  • 006. 10.5 Virtualization.mp4
    11:08
  • 007. 10.6 Embedded Systems.mp4
    13:01
  • 008. 10.7 Internet of Things (IoT).mp4
    10:20
  • 009. 10.8 Deep Dive Quiz.mp4
    15:16
  • 001. Learning objectives.mp4
    00:40
  • 002. 11.1 Network Devices.mp4
    10:34
  • 003. 11.2 Network Access Control.mp4
    16:29
  • 004. 11.3 Firewalls.mp4
    17:10
  • 005. 11.4 Secure Communications.mp4
    13:53
  • 006. 11.5 Deep Dive Quiz.mp4
    09:24
  • 001. Learning objectives.mp4
    00:30
  • 002. 12.1 Data Types.mp4
    20:39
  • 003. 12.2 Data Classification.mp4
    12:38
  • 004. 12.3 Data Protection.mp4
    12:07
  • 005. 12.4 Deep Dive Quiz.mp4
    07:30
  • 001. Learning objectives.mp4
    00:45
  • 002. 13.1 Backup and Recovery.mp4
    12:27
  • 003. 13.2 Resiliency Concepts.mp4
    16:30
  • 004. 13.3 Continuity of Operations.mp4
    12:54
  • 005. 13.4 Deep Dive Quiz.mp4
    08:26
  • 001. Learning objectives.mp4
    00:42
  • 002. 14.1 Secure Baselines and Hardening Targets.mp4
    12:20
  • 003. 14.2 Wireless Configuration.mp4
    12:34
  • 004. 14.3 Wireless Design.mp4
    13:57
  • 005. 14.4 Mobile Connectivity.mp4
    11:29
  • 006. 14.5 Mobile Device Management.mp4
    12:27
  • 007. 14.6 Application Security.mp4
    13:59
  • 008. 14.7 Secure Coding.mp4
    08:34
  • 009. 14.8 Deep Dive Quiz.mp4
    12:05
  • 001. Learning objectives.mp4
    00:37
  • 002. 15.1 Asset Management.mp4
    11:31
  • 003. 15.2 Deletion, Disposal, and Destruction.mp4
    12:56
  • 004. 15.3 Deep Dive Quiz.mp4
    09:42
  • 001. Learning objectives.mp4
    00:32
  • 002. 16.1 Vulnerability Identification.mp4
    13:09
  • 003. 16.2 Vulnerability Response and Remediation.mp4
    16:41
  • 004. 16.3 Deep Dive Quiz.mp4
    07:51
  • 001. Learning objectives.mp4
    00:43
  • 002. 17.1 Logging and Analysis.mp4
    16:41
  • 003. 17.2 SNMP, NetFlow, and SCAP.mp4
    11:39
  • 004. 17.3 Deep Dive Quiz.mp4
    07:42
  • 001. Learning objectives.mp4
    00:36
  • 002. 18.1 Enhancing Security with Network Devices.mp4
    12:22
  • 003. 18.2 TCPIP and Secure Protocols.mp4
    18:52
  • 004. 18.3 Email Security.mp4
    11:00
  • 005. 18.4 Group Policy and SELinux.mp4
    08:35
  • 006. 18.5 Deep Dive Quiz.mp4
    14:49
  • 001. Learning objectives.mp4
    00:38
  • 002. 19.1 Identity and Access Management (IAM).mp4
    15:31
  • 003. 19.2 Federated Identity.mp4
    12:32
  • 004. 19.3 Authentication.mp4
    14:44
  • 005. 19.4 Biometrics.mp4
    10:07
  • 006. 19.5 Access Control and Authorization.mp4
    16:41
  • 007. 19.6 Privileged Access Management.mp4
    10:44
  • 008. 19.7 Deep Dive Quiz.mp4
    15:20
  • 001. Learning objectives.mp4
    00:32
  • 002. 20.1 Scripting, Automation, and Orchestration.mp4
    13:10
  • 003. 20.2 Deep Dive Quiz.mp4
    06:16
  • 001. Learning objectives.mp4
    00:46
  • 002. 21.1 Incident Management.mp4
    12:59
  • 003. 21.2 Incident Response.mp4
    12:02
  • 004. 21.3 Evidence Handling.mp4
    14:19
  • 005. 21.4 Forensic Examination.mp4
    12:58
  • 006. 21.5 Disclosure and Notification.mp4
    12:12
  • 007. 21.6 Deep Dive Quiz.mp4
    14:01
  • 001. Learning objectives.mp4
    00:58
  • 002. 22.1 Data Sources.mp4
    12:30
  • 003. 22.2 Deep Dive Quiz.mp4
    05:39
  • 001. Learning objectives.mp4
    00:34
  • 002. 23.1 Governance Structure.mp4
    16:03
  • 003. 23.2 Governance Documents.mp4
    17:10
  • 004. 23.3 Deep Dive Quiz.mp4
    08:09
  • 001. Learning objectives.mp4
    00:39
  • 002. 24.1 Risk Concepts.mp4
    09:58
  • 003. 24.2 Risk Assessment and Analysis.mp4
    16:36
  • 004. 24.3 Risk Response and Treatment.mp4
    12:19
  • 005. 24.4 Business Impact Analysis.mp4
    13:48
  • 006. 24.5 Deep Dive Quiz.mp4
    15:18
  • 001. Learning objectives.mp4
    00:35
  • 002. 25.1 Third-party Risk Management.mp4
    11:22
  • 003. 25.2 Deep Dive Quiz.mp4
    08:27
  • 001. Learning objectives.mp4
    00:38
  • 002. 26.1 Compliance Monitoring.mp4
    10:19
  • 003. 26.2 Privacy Principles.mp4
    17:01
  • 004. 26.3 Deep Dive Quiz.mp4
    05:17
  • 001. Learning objectives.mp4
    00:47
  • 002. 27.1 Audit and Assurance.mp4
    13:24
  • 003. 27.2 Penetration Testing Concepts.mp4
    11:32
  • 004. 27.3 Penetration Testing Tools and Techiques.mp4
    11:22
  • 005. 27.4 Deep Dive Quiz.mp4
    09:13
  • 001. Learning objectives.mp4
    00:55
  • 002. 28.1 Education, Training, and Awareness.mp4
    18:55
  • 003. 28.2 Deep Dive Quiz.mp4
    06:40
  • 001. Learning objectives.mp4
    00:29
  • 002. 29.1 Understanding the SY0-701 Security+ Exam Structure.mp4
    04:14
  • 003. 29.2 SY0-701 Exam Testing Options.mp4
    05:23
  • 004. 29.3 SY0-701 Exam Testing Strategies.mp4
    08:14
  • 005. 29.4 Congratulations! Whats Next.mp4
    02:16
  • 001. Honeypots.mp4
    03:56
  • 002. Hashing and HMACS.mp4
    05:00
  • 003. Digital Certificates.mp4
    05:35
  • 001. Module introduction.mp4
    01:22
  • 001. Phone and Text Spoofing.mp4
    03:05
  • 002. Malware Analysis.mp4
    05:42
  • 003. Constructing Error Messages.mp4
    05:17
  • 004. Threat Intelligence Workflow.mp4
    03:08
  • 005. Zero-day Vulnerabilities.mp4
    04:11
  • 001. Module introduction.mp4
    01:33
  • 001. RAID.mp4
    03:45
  • 002. SSL and TLS Packet Capture.mp4
    07:24
  • 003. Cloud Controls.mp4
    05:01
  • 001. Module introduction.mp4
    01:09
  • 001. PowerShell.mp4
    06:16
  • 002. Pwned Passwords.mp4
    06:18
  • 003. IPv6 Addressing.mp4
    09:21
  • 004. Wireless Heat Maps.mp4
    05:00
  • 005. ZenMap.mp4
    05:50
  • 006. Log files.mp4
    06:35
  • 007. Ram Capture.mp4
    03:33
  • 001. Module introduction.mp4
    01:38
  • 001. Passive Reconnaissance.mp4
    04:31
  • 002. Policies and standards.mp4
    08:01
  • 003. Quantitative Risk Analysis.mp4
    05:26
  • 004. Privacy Walkthrough.mp4
    04:19
  • 001. Module introduction.mp4
    01:30
  • 001. Module introduction.mp4
    00:20
  • 001. CompTIA Security+ SY0-701 Summary.mp4
    00:51
  • More details


    User Reviews
    Rating
    0
    0
    0
    0
    0
    average 0
    Total votes0
    Focused display
    Pearson's video training library is an indispensable learning tool for today's competitive job market. Having essential technology training and certifications can open doors for career advancement and life enrichment. We take learning personally. We've published hundreds of up-to-date videos on wide variety of key topics for Professionals and IT Certification candidates. Now you can learn from renowned industry experts from anywhere in the world, without leaving home.
    • language english
    • Training sessions 182
    • duration 27:22:50
    • Release Date 2023/12/06

    Courses related to CompTIA Security+

    Courses related to Ethical Hacking

    Courses related to Penetration Testing