Companies Home Search Profile

CompTIA Security+ (SY0-701)

Focused View

Stone River eLearning

30:19:54

545 View
  • 1. Course Overview.mp4
    05:37
  • 1. Examining Security Control Categories.mp4
    12:22
  • 2. Examining Security Control Types.mp4
    19:23
  • 3. Examining the Principles of Security.mp4
    18:57
  • 4. Examining Authentication Factors.mp4
    15:36
  • 5. Examining Authorization and Access Control Models.mp4
    23:24
  • 6. Examining Authentication Authorization and Accounting (AAA).mp4
    14:21
  • 7. Examining the Principles of Zero Trust.mp4
    17:51
  • 8. Examining Physical Security.mp4
    20:35
  • 9. Examining Deception and Disruption Technology.mp4
    11:38
  • 10. Business Processes and Security Operations.mp4
    18:20
  • 11. Change Management Implications & Documentation.mp4
    19:10
  • 12. Examining Encryption Solutions.mp4
    24:59
  • 13. Examining Public Key Infrastructure (PKI).mp4
    22:57
  • 14. Examining Digital Certificates.mp4
    23:27
  • 15. Examining Asymmetric Encryption.mp4
    15:59
  • 16. Examining Symmetric Encryption.mp4
    15:47
  • 17. Examining Hashing and Obfuscation.mp4
    24:51
  • 1. Threat Actors.mp4
    25:27
  • 2. Social Engineering.mp4
    23:35
  • 3. Business Email Compromise.mp4
    19:59
  • 4. Digital System Threats.mp4
    24:08
  • 5. Network Based Threats.mp4
    23:09
  • 6. Removable Media Threats.mp4
    14:09
  • 7. Supply Chain Attacks.mp4
    15:18
  • 8. Application Vulnerabilities.mp4
    24:51
  • 9. Operating System Vulnerabilities.mp4
    22:07
  • 10. Web Based Vulnerabilities.mp4
    25:23
  • 11. Hardware Vulnerabilities.mp4
    24:20
  • 12. Cloud Vulnerabilities.mp4
    19:35
  • 13. Virtualization Vulnerabilities.mp4
    12:48
  • 14. Cryptographic Vulnerabilities.mp4
    20:17
  • 15. Mobile Device Vulnerabilities.mp4
    23:52
  • 16. Zero Day Vulnerabilities.mp4
    11:28
  • 17. Indicators of Malware Attacks.mp4
    22:12
  • 18. Indicators of Physical Attacks.mp4
    22:29
  • 19. Indicators of Network Attacks.mp4
    26:55
  • 20. Indicators of Application Attacks.mp4
    26:22
  • 21. Indicators of Cryptographic Attacks.mp4
    08:03
  • 22. Indicators of Password Attacks.mp4
    18:06
  • 23. Cybersecurity Mitigation Techniques.mp4
    19:27
  • 1. Cloud-Related Concepts.mp4
    22:11
  • 2. Network Infrastructure Concepts.mp4
    17:48
  • 3. Virtualization Concepts.mp4
    10:29
  • 4. IoT and SCADA.mp4
    14:09
  • 5. Architectural Model Considerations.mp4
    18:53
  • 6. Security Infrastructure Considerations.mp4
    14:16
  • 7. Network Appliances.mp4
    24:11
  • 8. Port Security.mp4
    20:08
  • 9. Firewall Types.mp4
    10:42
  • 10. Secure Communication and Access.mp4
    15:02
  • 11. Selecting Effective Controls.mp4
    07:42
  • 12. Data Types.mp4
    07:57
  • 13. Data Classifications.mp4
    09:45
  • 14. Data Considerations.mp4
    11:30
  • 15. Methods to Secure Data.mp4
    18:51
  • 16. HA and Site Considerations.mp4
    18:51
  • 17. Platform Diversity and Multi-Cloud Systems.mp4
    10:15
  • 18. Continuity of Operations and Capacity Planning.mp4
    12:58
  • 19. Testing.mp4
    14:37
  • 20. Backups.mp4
    11:48
  • 21. Power.mp4
    07:41
  • 1. Examining Identity and Access Management.mp4
    10:37
  • 2. Examining Wireless Security.mp4
    27:47
  • 3. Examining Operating System Security.mp4
    22:33
  • 4. Examining Firewalls and Intrusion Detection Devices.mp4
    22:29
  • 5. Examining Password Security.mp4
    24:50
  • 6. Examining Web Filtering.mp4
    13:32
  • 7. Examining the Incident Response Process and Activities.mp4
    14:31
  • 8. Examining Endpoint Detection and Response (EDR).mp4
    23:18
  • 9. Examining Single Sign-on.mp4
    18:06
  • 10. Examining Secure Network Protocols and Services.mp4
    22:34
  • 11. Examining Automation and Scripting Uses.mp4
    27:26
  • 12. Examining Asset Management.mp4
    24:03
  • 13. Examining Privileged Identity Management.mp4
    15:02
  • 14. Examining Application Security.mp4
    21:25
  • 15. Examining Investigation Data Sources and Log Data.mp4
    19:08
  • 16. Examining Security for Mobile Devices.mp4
    23:20
  • 17. Examining Vulnerability Analysis.mp4
    19:03
  • 18. Examining Digital Forensics Activities.mp4
    14:05
  • 19. Vulnerability Response Remediation and Reporting.mp4
    17:49
  • 20. Examining Security Baselines and Hardening.mp4
    22:19
  • 21. Examining User Onboarding and Offboarding.mp4
    20:38
  • 22. Examining Email Security.mp4
    19:09
  • 23. Examining Security Monitoring and Alerting.mp4
    26:40
  • 24. Identifying Vulnerabilities.mp4
    24:02
  • 1. Guidelines and Policies.mp4
    12:54
  • 2. Standards and Procedures.mp4
    13:49
  • 3. External Considerations and Revisions.mp4
    07:03
  • 4. Governance Structures.mp4
    10:35
  • 5. Roles and Responsibilities.mp4
    09:42
  • 6. Risk Identification and Assessment.mp4
    09:30
  • 7. Risk Analysis.mp4
    11:24
  • 8. Risk Register Tolerance and Appetite.mp4
    10:32
  • 9. Risk Management Strategies.mp4
    07:54
  • 10. Risk Reporting And BIA.mp4
    09:11
  • 11. Vendor Assessment and Selection.mp4
    08:20
  • 12. Agreement Types.mp4
    08:03
  • 13. Additional Vendor Considerations.mp4
    07:57
  • 14. Compliance.mp4
    09:05
  • 15. Compliance Monitoring.mp4
    06:20
  • 16. Privacy.mp4
    08:58
  • 17. Attestation.mp4
    06:27
  • 18. Audits.mp4
    08:42
  • 19. Penetration Testing.mp4
    11:16
  • 20. Phishing.mp4
    14:02
  • 21. Anomalous Behavior Recognition.mp4
    06:41
  • 22. User Guidance and Training.mp4
    09:03
  • 23. Reporting and Monitoring.mp4
    08:15
  • 24. Development and Execution.mp4
    10:47
  • Description


    Certificate Course

    What You'll Learn?


    • Explain types of malware, Compare and contrast various types of attacks, Analyze potential indicators of compromise.
    • Install and configure network components, Given a scenario, use the appropriate tool to assess organizational security.
    • Implement secure network architecture concepts,Explain secure systems design
    • Install and configure identity and access services. Implement identity and access management controls.
    • Explain the importance of policies, plans, and procedures. Summarize business impact analysis concepts.
    • Compare and contrast basic concepts of cryptography. Given a scenario, install and configure wireless security settings.
    • Explain the importance of threat intelligence. Given an incident, utilize basic forensic tools.
    • Compare and contrast various types of controls. Explain the importance of policies, plans, and procedures related to organizational security.

    Who is this for?


  • The CompTIA Security+ certification is designed for IT professionals who want to establish a career in cybersecurity.
  • The certification is suitable for anyone looking to validate their knowledge and skills in foundational cybersecurity concepts, regardless of their specific job role within the IT industry.
  • What You Need to Know?


  • The CompTIA Security+ certification typically does not have strict prerequisites, making it an entry-level certification in the realm of cybersecurity. However, it's recommended that candidates have some foundational knowledge and experience in IT and networking before attempting the exam. CompTIA suggests that candidates ideally have the CompTIA Network+ certification and two years of work experience in IT with a security focus.
  • More details


    Description

    The new CompTIA Security+ (SY0-701) represents the latest and greatest in cybersecurity, covering the most in-demand skills related to current threats, automation, zero trust, IoT, risk – and more. Once certified, you’ll understand the core skills needed to succeed on the job – and employers will notice too. The Security+ exam verifies you have the knowledge and skills required to:

    · Assess the security posture of an enterprise environment and recommend and implement appropriate security solutions.

    · Monitor and secure hybrid environments, including cloud, mobile, Internet of Things (IoT), and operational technology.

    · Operate with an awareness of applicable regulations and policies, including principles of governance, risk, and compliance.

    · Identify, analyze, and respond to security events and incidents.

    CompTIA Security+ is compliant with ISO 17024 standards and approved by the U.S. DoD to meet directive 8140/8570.01-M requirements. Regulators and government rely on ANSI accreditation because it provides confidence and trust in the outputs of an accredited program.

    This course is designed to equip you with the knowledge and skills required to excel in the dynamic field of cybersecurity and achieve the CompTIA Security+ certification.

    This course is designed to equip you with the knowledge and skills required to excel in the dynamic field of cybersecurity and achieve the CompTIA Security+ certification.


    Who this course is for:

    • The CompTIA Security+ certification is designed for IT professionals who want to establish a career in cybersecurity.
    • The certification is suitable for anyone looking to validate their knowledge and skills in foundational cybersecurity concepts, regardless of their specific job role within the IT industry.

    User Reviews
    Rating
    0
    0
    0
    0
    0
    average 0
    Total votes0
    Focused display
    Stone River eLearning
    Stone River eLearning
    Instructor's Courses
    At Stone River eLearning, technology is all we teach. If you're interested in IT, programming, development or design - we have it covered. Check out our huge catalog of courses and join the over 1,200,000+ students currently taking Stone River eLearning courses. We currently offer 1000+ different technology training courses on our Stone River eLearning website and are adding new courses on hot and trending topics every month. A subscription option is available for those with a real passion for learning.
    Students take courses primarily to improve job-related skills.Some courses generate credit toward technical certification. Udemy has made a special effort to attract corporate trainers seeking to create coursework for employees of their company.
    • language english
    • Training sessions 110
    • duration 30:19:54
    • English subtitles has
    • Release Date 2024/06/23