Companies Home Search Profile

CompTIA Security+ (SY0-701) Cert Prep

Focused View

Mike Chapple

17:25:23

0 View
  • 01 - About the Security+ exam.mp4
    01:02
  • 02 - Whats new in SY0-701.mp4
    01:35
  • 01 - The Security+ exam.mp4
    02:35
  • 02 - Careers in information security.mp4
    03:45
  • 03 - The value of certification.mp4
    03:14
  • 04 - Stackable certifications.mp4
    03:12
  • 05 - Study resources.mp4
    01:33
  • 01 - In-person exam environment.mp4
    03:05
  • 02 - At-home testing.mp4
    01:10
  • 03 - Security+ question types.mp4
    02:43
  • 04 - Passing the Security+ exam.mp4
    02:26
  • 01 - Exam tips.mp4
    01:00
  • 02 - Practice tests.mp4
    00:47
  • 03 - Continuing education requirements.mp4
    02:08
  • 01 - General security concepts.mp4
    02:19
  • 01 - The goals of information security.mp4
    02:11
  • 02 - Authentication, authorization, and accounting (AAA).mp4
    03:31
  • 03 - Categorizing security controls.mp4
    05:11
  • 04 - Conducting a gap analysis.mp4
    02:34
  • 05 - Zero Trust.mp4
    05:32
  • 06 - Physical access control.mp4
    04:40
  • 07 - Physical security personnel.mp4
    02:12
  • 08 - Deception technologies.mp4
    02:55
  • 09 - Change management.mp4
    06:02
  • 01 - Understanding encryption.mp4
    02:49
  • 02 - Symmetric and asymmetric cryptography.mp4
    04:18
  • 03 - Goals of cryptography.mp4
    03:47
  • 04 - Choosing encryption algorithms.mp4
    03:27
  • 05 - The cryptographic lifecycle.mp4
    02:34
  • 06 - Data de-identification.mp4
    02:44
  • 07 - Data obfuscation.mp4
    02:12
  • 01 - Data Encryption Standard (DES).mp4
    02:50
  • 02 - 3DES.mp4
    02:58
  • 03 - AES, Blowfish, and Twofish.mp4
    05:47
  • 04 - Steganography.mp4
    03:57
  • 02 - PGP and GnuPG.mp4
    10:47
  • 03 - Elliptic-curve and quantum cryptography.mp4
    02:46
  • 04 - Tor and perfect forward secrecy.mp4
    05:23
  • 01 - Key exchange.mp4
    02:42
  • 02 - Diffie-Hellman.mp4
    04:33
  • 03 - Key escrow.mp4
    02:55
  • 04 - Key stretching.mp4
    01:43
  • 05 - Hardware security modules.mp4
    03:02
  • 01 - Trust models.mp4
    02:52
  • 02 - PKI and digital certificates.mp4
    04:05
  • 03 - Hash functions.mp4
    07:38
  • 04 - Digital signatures.mp4
    03:50
  • 05 - Digital signature standard.mp4
    01:27
  • 06 - Create a digital certificate.mp4
    04:55
  • 07 - Revoke a digital certificate.mp4
    01:28
  • 08 - Certificate stapling.mp4
    02:29
  • 09 - Certificate authorities.mp4
    06:13
  • 10 - Certificate subjects.mp4
    03:35
  • 11 - Certificate types.mp4
    02:55
  • 12 - Certificate formats.mp4
    02:30
  • 01 - TLS and SSL.mp4
    03:38
  • 02 - Blockchain.mp4
    01:45
  • 01 - Threats, vulnerabilities, and mitigations.mp4
    02:09
  • 01 - Vulnerability impact.mp4
    05:16
  • 02 - Supply chain vulnerabilities.mp4
    04:23
  • 03 - Configuration vulnerabilities.mp4
    03:44
  • 04 - Architectural vulnerabilities.mp4
    02:03
  • 01 - Comparing viruses, worms, and trojans.mp4
    05:20
  • 02 - Malware payloads.mp4
    03:51
  • 03 - Understanding backdoors and logic bombs.mp4
    03:56
  • 04 - Looking at advanced malware.mp4
    02:58
  • 05 - Understanding botnets.mp4
    02:54
  • 06 - Malicious script execution.mp4
    02:44
  • 01 - Cybersecurity adversaries.mp4
    04:19
  • 02 - Attacker motivations.mp4
    02:40
  • 03 - Preventing insider threats.mp4
    02:43
  • 04 - Attack vectors.mp4
    03:59
  • 05 - Zero-day attacks.mp4
    03:25
  • 01 - Social engineering.mp4
    05:29
  • 02 - Impersonation attacks.mp4
    04:39
  • 03 - Identity fraud and pretexting.mp4
    02:56
  • 04 - Watering hole attacks.mp4
    02:33
  • 05 - Physical social engineering.mp4
    02:31
  • 06 - Business email compromise.mp4
    02:01
  • 07 - Misinformation and disinformation.mp4
    01:59
  • 01 - Password attacks.mp4
    08:12
  • 02 - Password spraying and credential stuffing.mp4
    01:47
  • 01 - Preventing SQL injection.mp4
    04:25
  • 02 - Understanding cross-site scripting.mp4
    03:17
  • 03 - Request forgery.mp4
    04:08
  • 04 - Overflow attacks.mp4
    03:21
  • 05 - Explaining cookies and attachments.mp4
    04:07
  • 06 - Session hijacking.mp4
    04:08
  • 07 - Code execution attacks.mp4
    02:43
  • 08 - Privilege escalation.mp4
    01:56
  • 09 - OWASP Top Ten.mp4
    04:45
  • 10 - Application security.mp4
    04:03
  • 11 - Defending against directory traversal.mp4
    03:04
  • 12 - Race condition vulnerabilities.mp4
    02:13
  • 01 - Brute force attacks.mp4
    02:57
  • 02 - Knowledge-based attacks.mp4
    02:41
  • 03 - Limitations of encryption algorithms.mp4
    02:42
  • 01 - Denial-of-service attacks.mp4
    04:15
  • 02 - Eavesdropping attacks.mp4
    04:12
  • 03 - DNS attacks.mp4
    03:30
  • 04 - Wireless attacks.mp4
    02:54
  • 05 - Propagation attacks.mp4
    04:19
  • 06 - Preventing rogues and evil twins.mp4
    02:50
  • 07 - Disassociation attacks.mp4
    02:10
  • 08 - Understanding Bluetooth attacks.mp4
    01:23
  • 09 - RFID security.mp4
    02:17
  • 01 - Attack indicators.mp4
    02:42
  • 01 - Security architecture.mp4
    01:58
  • 01 - What is the cloud.mp4
    03:53
  • 02 - Cloud computing roles.mp4
    02:35
  • 03 - Drivers for cloud computing.mp4
    03:17
  • 04 - Multitenant computing.mp4
    02:15
  • 05 - Cloud considerations.mp4
    02:14
  • 06 - Security service providers.mp4
    02:38
  • 01 - Virtualization.mp4
    04:48
  • 02 - Desktop and application virtualization.mp4
    02:38
  • 01 - Cloud compute resources.mp4
    07:52
  • 02 - Cloud storage.mp4
    03:02
  • 03 - Cloud networking.mp4
    02:30
  • 04 - Cloud databases.mp4
    01:56
  • 05 - Cloud orchestration.mp4
    02:18
  • 06 - Containers.mp4
    01:58
  • 07 - SOA and microservices.mp4
    01:39
  • 01 - Cloud activities and the cloud reference architecture.mp4
    02:48
  • 02 - Cloud deployment models.mp4
    02:45
  • 03 - Cloud service categories.mp4
    04:41
  • 04 - Security and privacy concerns in the cloud.mp4
    02:51
  • 05 - Data sovereignty.mp4
    02:37
  • 06 - Operational concerns in the cloud.mp4
    03:37
  • 01 - Cloud firewall considerations.mp4
    03:07
  • 02 - Cloud application security.mp4
    04:10
  • 03 - Cloud provider security controls.mp4
    02:17
  • 01 - Introducing TCPIP.mp4
    05:06
  • 02 - IP addresses and DHCP.mp4
    03:55
  • 03 - Domain Name System (DNS).mp4
    04:22
  • 04 - Network ports.mp4
    03:37
  • 05 - ICMP.mp4
    03:16
  • 01 - Security zones.mp4
    03:38
  • 02 - VLANs and network segmentation.mp4
    01:36
  • 03 - Security device placement.mp4
    06:17
  • 04 - Software-defined networking (SDN).mp4
    03:49
  • 01 - Routers, switches, and bridges.mp4
    03:06
  • 02 - Firewalls.mp4
    05:50
  • 03 - Web application firewalls.mp4
    03:07
  • 04 - Proxy servers.mp4
    02:41
  • 05 - Load balancers.mp4
    04:09
  • 06 - VPNs and VPN concentrators.mp4
    04:29
  • 07 - Network intrusion detection and prevention.mp4
    04:58
  • 08 - Protocol analyzers.mp4
    08:57
  • 09 - Unified threat management.mp4
    01:57
  • 10 - Failure modes.mp4
    01:47
  • 01 - Restricting network access.mp4
    02:08
  • 02 - Network access control.mp4
    04:30
  • 03 - Router configuration security.mp4
    04:05
  • 04 - Switch configuration security.mp4
    03:42
  • 05 - Maintaining network availability.mp4
    02:32
  • 06 - Network monitoring.mp4
    03:41
  • 07 - SNMP.mp4
    02:54
  • 08 - Isolating sensitive systems.mp4
    02:00
  • 09 - Zero trust networking.mp4
    04:09
  • 10 - Secure access service edge (SASE).mp4
    03:50
  • 01 - Industrial control systems.mp4
    05:08
  • 02 - Internet of Things.mp4
    03:06
  • 03 - Securing smart devices.mp4
    03:07
  • 04 - Secure networking for smart devices.mp4
    02:23
  • 05 - Embedded systems.mp4
    04:29
  • 01 - Understanding data security.mp4
    02:18
  • 02 - Data types.mp4
    02:06
  • 03 - Data anonymization.mp4
    02:58
  • 04 - Data obfuscation.mp4
    02:03
  • 05 - Information classification.mp4
    03:12
  • 01 - Business continuity planning.mp4
    03:10
  • 02 - Business continuity controls.mp4
    03:32
  • 03 - High availability and fault tolerance.mp4
    05:10
  • 04 - Disaster recovery.mp4
    04:24
  • 05 - Backups.mp4
    05:18
  • 06 - Restoring backups.mp4
    02:11
  • 07 - Disaster recovery sites.mp4
    03:16
  • 08 - Testing BCDR plans.mp4
    02:26
  • 09 - Capacity planning.mp4
    01:30
  • 01 - Security operations.mp4
    02:59
  • 01 - Developing security baselines.mp4
    04:13
  • 02 - Leveraging industry standards.mp4
    01:52
  • 03 - Customizing security standards.mp4
    02:14
  • 01 - Operating system security.mp4
    08:44
  • 02 - Malware prevention.mp4
    07:25
  • 03 - Application management.mp4
    03:46
  • 04 - Host-based network security controls.mp4
    07:44
  • 05 - File integrity monitoring.mp4
    04:09
  • 06 - Data loss prevention.mp4
    05:17
  • 07 - Data encryption.mp4
    05:39
  • 08 - Hardware and firmware security.mp4
    05:24
  • 09 - Linux file permissions.mp4
    04:02
  • 10 - Web content filtering.mp4
    01:47
  • 01 - Change management.mp4
    02:21
  • 02 - Configuration management.mp4
    02:31
  • 03 - Physical asset management.mp4
    03:08
  • 04 - Disposal and decommissioning.mp4
    03:04
  • 01 - Mobile connection methods.mp4
    02:36
  • 02 - Mobile device security.mp4
    02:27
  • 03 - Mobile device management.mp4
    06:17
  • 04 - Mobile device tracking.mp4
    03:05
  • 05 - Mobile application security.mp4
    03:54
  • 06 - Mobile security enforcement.mp4
    03:54
  • 07 - Bring your own device (BYOD).mp4
    04:35
  • 08 - Mobile deployment models.mp4
    02:54
  • 01 - Understanding wireless networking.mp4
    02:56
  • 02 - Wireless encryption.mp4
    02:52
  • 03 - Wireless authentication.mp4
    04:42
  • 04 - RADIUS.mp4
    02:18
  • 05 - Wireless signal propagation.mp4
    02:48
  • 06 - Wireless networking equipment.mp4
    01:43
  • 01 - Code review.mp4
    02:40
  • 02 - Software testing.mp4
    02:44
  • 03 - Code security tests.mp4
    02:15
  • 04 - Fuzz testing.mp4
    06:48
  • 05 - Acquired software.mp4
    02:57
  • 06 - Package monitoring.mp4
    01:01
  • 01 - Threat intelligence.mp4
    03:21
  • 02 - Intelligence sharing.mp4
    02:06
  • 03 - Threat hunting.mp4
    03:50
  • 01 - What is vulnerability management.mp4
    05:02
  • 02 - Identify scan targets.mp4
    04:24
  • 03 - Scan configuration.mp4
    05:20
  • 04 - Scan perspective.mp4
    04:24
  • 05 - Security Content Automation Protocol (SCAP).mp4
    02:27
  • 06 - Common Vulnerability Scoring System (CVSS ).mp4
    03:31
  • 07 - Analyzing scan reports.mp4
    04:37
  • 08 - Correlating scan results.mp4
    02:20
  • 09 - Vulnerability response and remediation.mp4
    02:14
  • 01 - Penetration testing.mp4
    06:01
  • 02 - Responsible disclosure.mp4
    03:00
  • 03 - Bug bounty.mp4
    03:48
  • 01 - Logging security information.mp4
    05:30
  • 02 - Security information and event management.mp4
    04:08
  • 03 - Monitoring activities.mp4
    02:59
  • 04 - Endpoint monitoring.mp4
    02:56
  • 05 - Automation and orchestration.mp4
    04:46
  • 01 - TLS and SSL.mp4
    05:04
  • 02 - IPSec.mp4
    02:49
  • 03 - Securing common protocols.mp4
    08:01
  • 04 - DKIM, DMARC, and SPF.mp4
    05:38
  • 05 - Email gateways.mp4
    01:21
  • 01 - Identification, authentication, authorization, and accounting.mp4
    03:34
  • 02 - Usernames and access cards.mp4
    03:23
  • 03 - Biometrics.mp4
    02:42
  • 04 - Registration and identity proofing.mp4
    04:10
  • 01 - Authentication factors.mp4
    03:26
  • 02 - Multifactor authentication.mp4
    02:17
  • 03 - Something you have.mp4
    04:24
  • 04 - Password policy.mp4
    04:19
  • 05 - Password managers.mp4
    02:03
  • 06 - Passwordless authentication.mp4
    03:23
  • 07 - Single sign-on and federation.mp4
    03:09
  • 08 - Kerberos and LDAP.mp4
    05:18
  • 09 - SAML.mp4
    02:35
  • 10 - OAUTH and OpenID Connect.mp4
    02:55
  • 11 - Certificate-based authentication.mp4
    05:25
  • 01 - Understanding authorization.mp4
    04:03
  • 02 - Mandatory access controls.mp4
    02:28
  • 03 - Discretionary access controls.mp4
    02:28
  • 04 - Access control lists.mp4
    04:50
  • 05 - Advanced authorization concepts.mp4
    05:18
  • 01 - Understanding account and privilege management.mp4
    03:08
  • 02 - Privileged access management.mp4
    03:45
  • 03 - Provisioning and deprovisioning.mp4
    03:47
  • 01 - Build an incident response program.mp4
    04:13
  • 02 - Incident identification.mp4
    04:26
  • 03 - Escalation and notification.mp4
    02:29
  • 04 - Mitigation.mp4
    02:22
  • 05 - Containment techniques.mp4
    03:00
  • 06 - Incident eradication and recovery.mp4
    05:01
  • 07 - Post-incident activities.mp4
    03:49
  • 08 - Incident response training and testing.mp4
    01:13
  • 01 - Introduction to forensics.mp4
    03:21
  • 02 - System and file forensics.mp4
    04:26
  • 03 - Chain of custody.mp4
    01:50
  • 04 - E-discovery and evidence production.mp4
    03:03
  • 05 - Investigation data sources.mp4
    02:47
  • 01 - Security program management and oversight.mp4
    01:52
  • 01 - Security policy framework.mp4
    04:34
  • 02 - Security policies.mp4
    05:07
  • 03 - Security standards.mp4
    01:27
  • 04 - Security procedures.mp4
    01:22
  • 05 - Policy monitoring and revision.mp4
    01:23
  • 06 - Policy considerations.mp4
    01:11
  • 01 - Security governance structures.mp4
    02:56
  • 02 - Data security roles.mp4
    03:38
  • 01 - Risk assessment.mp4
    05:51
  • 02 - Quantitative risk assessment.mp4
    06:10
  • 03 - Business impact analysis.mp4
    02:12
  • 04 - Risk treatment options.mp4
    06:00
  • 05 - Risk visibility and reporting.mp4
    02:57
  • 06 - Ongoing risk assessment.mp4
    02:25
  • 07 - Security metrics.mp4
    03:24
  • 01 - Managing vendor relationships.mp4
    04:12
  • 02 - Vendor agreements.mp4
    03:49
  • 03 - Vendor information management.mp4
    01:41
  • 01 - Legal and compliance risks.mp4
    02:19
  • 02 - Compliance monitoring and reporting.mp4
    03:16
  • 01 - Audits and assessments.mp4
    05:15
  • 01 - Continuing Your Studies.mp4
    00:22
  • Description


    CompTIA Security+ is an entry-level certification that requires a thorough understanding of network and device security, risk mitigation strategies, compliance, and more. This course provides CompTIA Security+ candidates with essential information they need to prepare for the qualifying exam. Cybersecurity expert Mike Chapple first goes over some of the basics of the exam, then covers the six domains for the latest version of the exam, SY0-701. He shares study tips that can help you feel prepared to take and pass the test on your first try. Plus, learn where to find practice tests to get hands-on experience and how to keep your certification current by continuing your studies.

    More details


    User Reviews
    Rating
    0
    0
    0
    0
    0
    average 0
    Total votes0
    Focused display
    Mike Chapple
    Mike Chapple
    Instructor's Courses
    Cybersecurity and analytics educator and leader with over 20 years of experience in government, the private sector and higher education. Author of over 30 books, including best-selling study guides from Wiley covering the CISSP, Security+, CISM, CySA+, CIPP/US, and PenTest+ exams. Creator of over 100 cybersecurity and business analytics video courses on LinkedIn Learning.
    LinkedIn Learning is an American online learning provider. It provides video courses taught by industry experts in software, creative, and business skills. It is a subsidiary of LinkedIn. All the courses on LinkedIn fall into four categories: Business, Creative, Technology and Certifications. It was founded in 1995 by Lynda Weinman as Lynda.com before being acquired by LinkedIn in 2015. Microsoft acquired LinkedIn in December 2016.
    • language english
    • Training sessions 302
    • duration 17:25:23
    • English subtitles has
    • Release Date 2024/12/06