Companies Home Search Profile

CompTIA Security+ (SY0-701) Cert Prep: 4 Security Operations

Focused View

Mike Chapple

6:06:13

21 View
  • 01 - Security operations.mp4
    00:51
  • 02 - Study resources.mp4
    01:34
  • 01 - Developing security baselines.mp4
    04:13
  • 02 - Leveraging industry standards.mp4
    01:52
  • 03 - Customizing security standards.mp4
    02:14
  • 01 - Operating system security.mp4
    08:44
  • 02 - Malware prevention.mp4
    07:25
  • 03 - Application management.mp4
    03:46
  • 04 - Host-based network security controls.mp4
    07:44
  • 05 - File integrity monitoring.mp4
    04:09
  • 06 - Data loss prevention.mp4
    05:17
  • 07 - Data encryption.mp4
    05:39
  • 08 - Hardware and firmware security.mp4
    05:24
  • 09 - Linux file permissions.mp4
    04:02
  • 10 - Web content filtering.mp4
    01:47
  • 01 - Change management.mp4
    02:21
  • 02 - Configuration management.mp4
    02:31
  • 03 - Physical asset management.mp4
    03:08
  • 04 - Disposal and decommissioning.mp4
    03:04
  • 01 - Mobile connection methods.mp4
    02:36
  • 02 - Mobile device security.mp4
    02:27
  • 03 - Mobile device management.mp4
    06:17
  • 04 - Mobile device tracking.mp4
    03:05
  • 05 - Mobile application security.mp4
    03:54
  • 06 - Mobile security enforcement.mp4
    03:54
  • 07 - Bring your own device (BYOD).mp4
    04:35
  • 08 - Mobile deployment models.mp4
    02:54
  • 01 - Understanding wireless networking.mp4
    02:56
  • 02 - Wireless encryption.mp4
    02:52
  • 03 - Wireless authentication.mp4
    04:42
  • 04 - RADIUS.mp4
    02:18
  • 05 - Wireless signal propagation.mp4
    02:48
  • 06 - Wireless networking equipment.mp4
    01:43
  • 01 - Code review.mp4
    02:40
  • 02 - Software testing.mp4
    02:44
  • 03 - Code security tests.mp4
    02:15
  • 04 - Fuzz testing.mp4
    06:48
  • 05 - Acquired software.mp4
    02:57
  • 06 - Package monitoring.mp4
    01:01
  • 01 - Threat intelligence.mp4
    03:21
  • 02 - Intelligence sharing.mp4
    02:06
  • 03 - Threat hunting.mp4
    03:50
  • 01 - What is vulnerability management.mp4
    05:02
  • 02 - Identify scan targets.mp4
    04:24
  • 03 - Scan configuration.mp4
    05:20
  • 04 - Scan perspective.mp4
    04:24
  • 05 - Security Content Automation Protocol (SCAP).mp4
    02:27
  • 06 - Common Vulnerability Scoring System (CVSS ).mp4
    03:31
  • 07 - Analyzing scan reports.mp4
    04:37
  • 08 - Correlating scan results.mp4
    02:20
  • 09 - Vulnerability response and remediation.mp4
    02:14
  • 01 - Penetration testing.mp4
    06:01
  • 02 - Responsible disclosure.mp4
    03:00
  • 03 - Bug bounty.mp4
    03:48
  • 01 - Logging security information.mp4
    05:30
  • 02 - Security information and event management.mp4
    04:08
  • 03 - Monitoring activities.mp4
    02:59
  • 04 - Endpoint monitoring.mp4
    02:56
  • 05 - Automation and orchestration.mp4
    04:46
  • 01 - TLS and SSL.mp4
    05:04
  • 02 - IPSec.mp4
    02:49
  • 03 - Securing common protocols.mp4
    08:01
  • 04 - DKIM, DMARC, and SPF.mp4
    05:38
  • 05 - Email gateways.mp4
    01:21
  • 01 - Identification, authentication, authorization, and accounting.mp4
    03:34
  • 02 - Usernames and access cards.mp4
    03:23
  • 03 - Biometrics.mp4
    02:42
  • 04 - Registration and identity proofing.mp4
    04:10
  • 01 - Authentication factors.mp4
    03:26
  • 02 - Multifactor authentication.mp4
    02:17
  • 03 - Something you have.mp4
    04:24
  • 04 - Password policy.mp4
    04:19
  • 05 - Password managers.mp4
    02:03
  • 06 - Passwordless authentication.mp4
    03:23
  • 07 - Single sign-on and federation.mp4
    03:09
  • 08 - Kerberos and LDAP.mp4
    05:18
  • 09 - SAML.mp4
    02:35
  • 10 - OAUTH and OpenID Connect.mp4
    02:55
  • 11 - Certificate-based authentication.mp4
    05:25
  • 01 - Understanding authorization.mp4
    04:03
  • 02 - Mandatory access controls.mp4
    02:28
  • 03 - Discretionary access controls.mp4
    02:28
  • 04 - Access control lists.mp4
    04:50
  • 05 - Advanced authorization concepts.mp4
    05:18
  • 01 - Understanding account and privilege management.mp4
    03:08
  • 02 - Privileged access management.mp4
    03:45
  • 03 - Provisioning and deprovisioning.mp4
    03:47
  • 01 - Build an incident response program.mp4
    04:13
  • 02 - Incident identification.mp4
    04:26
  • 03 - Escalation and notification.mp4
    02:29
  • 04 - Mitigation.mp4
    02:22
  • 05 - Containment techniques.mp4
    03:00
  • 06 - Incident eradication and recovery.mp4
    05:01
  • 07 - Post-incident activities.mp4
    03:49
  • 08 - Incident response training and testing.mp4
    01:13
  • 01 - Introduction to forensics.mp4
    03:21
  • 02 - System and file forensics.mp4
    04:26
  • 03 - Chain of custody.mp4
    01:50
  • 04 - E-discovery and evidence production.mp4
    03:03
  • 05 - Investigation data sources.mp4
    02:47
  • 01 - Continuing your studies.mp4
    00:35
  • Description


    In this course, security and information technology expert Mike Chapple guides you through security operations principles to help you prepare for the Security+ exam. This course, part of a series of courses, covers the topics and skills from the Security Operation exam domain. Find out how to apply common security techniques to computing resources. Explore the security implications of proper hardware, software, and data asset management. Plus, learn about vulnerability management activities, as well as the concepts and tools you will use in security alerting and monitoring.

    We are a CompTIA Partner. As such, we are able to offer CompTIA exam vouchers at a 10% discount. For more information on how to obtain this discount, please download these PDF instructions.

    More details


    User Reviews
    Rating
    0
    0
    0
    0
    0
    average 0
    Total votes0
    Focused display
    Mike Chapple
    Mike Chapple
    Instructor's Courses
    Cybersecurity and analytics educator and leader with over 20 years of experience in government, the private sector and higher education. Author of over 30 books, including best-selling study guides from Wiley covering the CISSP, Security+, CISM, CySA+, CIPP/US, and PenTest+ exams. Creator of over 100 cybersecurity and business analytics video courses on LinkedIn Learning.
    LinkedIn Learning is an American online learning provider. It provides video courses taught by industry experts in software, creative, and business skills. It is a subsidiary of LinkedIn. All the courses on LinkedIn fall into four categories: Business, Creative, Technology and Certifications. It was founded in 1995 by Lynda Weinman as Lynda.com before being acquired by LinkedIn in 2015. Microsoft acquired LinkedIn in December 2016.
    • language english
    • Training sessions 101
    • duration 6:06:13
    • English subtitles has
    • Release Date 2024/05/01