Companies Home Search Profile

CompTIA Security+ SY0-701: General Security Concepts-Vol 1

Focused View

Anand Rao Nednur

7:23:57

2 View
  • 1 - Cyber Security 2024 Forecast.mp4
    01:46
  • 2 - Course Author Introduction.mp4
    02:06
  • 3 - Chapter Introduction.mp4
    02:27
  • 4 - Technical Controls.mp4
    04:12
  • 5 - Managerial controls.mp4
    05:20
  • 6 - Operations Controls.mp4
    05:17
  • 7 - Physical Controls.mp4
    03:30
  • 8 - Control Types Introduction.mp4
    02:39
  • 9 - Preventive Control types.mp4
    02:10
  • 10 - Deterrent Controls.mp4
    02:58
  • 11 - Detective Controls.mp4
    03:41
  • 12 - What are organizations doing to implement Detective controls.mp4
    09:21
  • 13 - Corrective control.mp4
    03:43
  • 14 - Compensating Control.mp4
    03:03
  • 15 - Directive Controls.mp4
    03:28
  • 16 - CIA triad Introduction.mp4
    01:39
  • 17 - Confidentiality.mp4
    03:09
  • 18 - Integrity.mp4
    03:13
  • 19 - Availability.mp4
    02:43
  • 20 - NonRepudiation.mp4
    08:45
  • 21 - AAA.mp4
    04:54
  • 22 - Gap Analysis in Cyber Security.mp4
    06:15
  • 23 - Zero Trust Control Plane.mp4
    03:44
  • 24 - Zero Trust Data Plane.mp4
    03:44
  • 25 - Physical Security.mp4
    05:09
  • 26 - Physical Controls Sensors.mp4
    04:24
  • 27 - Deception and Disruption Technologies.mp4
    04:18
  • 28 - Chapter Introduction.mp4
    01:00
  • 29 - Approval Process.mp4
    04:48
  • 30 - Ownership.mp4
    03:12
  • 31 - Stakeholders.mp4
    03:15
  • 32 - Impact Analysis.mp4
    04:00
  • 33 - Test Results.mp4
    03:19
  • 34 - Backout Plans.mp4
    02:56
  • 35 - Maintenance Window.mp4
    03:36
  • 36 - Standard Operating Procedures.mp4
    04:16
  • 37 - Technical Implications.mp4
    05:13
  • 38 - Documentation.mp4
    03:37
  • 39 - Version Control.mp4
    03:27
  • 40 - Chapter Introduction.mp4
    02:59
  • 41 - Chocolate Cake Recipe PKI Example 1.mp4
    03:20
  • 42 - The digital treasure PKI Example 2.mp4
    03:23
  • 43 - Browser to Webserver E2E Encryption.mp4
    12:13
  • 44 - PKI.mp4
    05:11
  • 45 - Encryption What will we learn.mp4
    01:55
  • 46 - Encryption Levels.mp4
    04:52
  • 47 - Transport Encryption.mp4
    04:35
  • 48 - Symmetric Encryption.mp4
    04:45
  • 49 - Asymmetric Encryption.mp4
    03:54
  • 50 - Key exchange Part 1.mp4
    08:47
  • 51 - Key Exchange Algorithms Part 2.mp4
    05:48
  • 52 - Encryption Key Lengths.mp4
    05:00
  • 53 - Encryption and PKI Tools Introduction.mp4
    00:39
  • 54 - TPM.mp4
    03:53
  • 55 - HSM.mp4
    03:47
  • 56 - KMS.mp4
    03:36
  • 57 - Secure Enclaves.mp4
    03:31
  • 58 - Obfuscation.mp4
    02:41
  • 59 - Steganography.mp4
    03:04
  • 60 - Tokenization.mp4
    03:19
  • 61 - Data Masking.mp4
    03:20
  • 62 - Data Masking Types.mp4
    02:48
  • 63 - Masking Techniques.mp4
    02:54
  • 64 - Hashing Introduction What are Hash Functions.mp4
    03:14
  • 65 - Real word usage of Hash Functions.mp4
    03:09
  • 66 - Journey of Hashing Algorithm.mp4
    03:35
  • 67 - Strengths Weaknesses of Hashing Algorithms.mp4
    03:43
  • 68 - Using Right Hashing Algorithms.mp4
    03:04
  • 69 - Hashing Vulnerabilities and Historical Exploits.mp4
    02:29
  • 70 - Salting.mp4
    03:09
  • 71 - Salting Under the hood.mp4
    04:44
  • 72 - Definition and basic concept History of digital signatures.mp4
    02:54
  • 73 - The importance of digital signatures in modern communication.mp4
    03:08
  • 74 - The cryptographic principles behind digital signatures.mp4
    04:20
  • 75 - The process of creating and verifying a digital signature.mp4
    03:51
  • 76 - How digital signatures ensure the integrity and nonrepudiation of data.mp4
    04:02
  • 77 - Common algorithms used for digital signatures.mp4
    04:28
  • 78 - Digital signature standards.mp4
    03:23
  • 79 - Advanced cryptographic concepts related to digital signatures.mp4
    04:37
  • 80 - Key stretching.mp4
    02:15
  • 81 - Contributors in the field of Key stretching.mp4
    02:21
  • 82 - Blockchain Introduction.mp4
    03:33
  • 83 - Blockchain as a decentralized digital ledger.mp4
    02:20
  • 84 - Adoption of block chain.mp4
    03:49
  • 85 - The Dawn of Internet Security and the Rise of Digital Certificates.mp4
    04:51
  • 86 - A brief history of cryptographic methods.mp4
    04:03
  • 87 - The introduction of SSL by Netscape.mp4
    03:58
  • 88 - How SSL became the standard for securing internet communications.mp4
    04:08
  • 89 - Why SSL evolved into TLS.mp4
    02:30
  • 90 - Poodle Attack.mp4
    04:26
  • 91 - Key improvements and differences between SSL and TLS protocols.mp4
    03:50
  • 92 - Versions of TLS and their Enhancements.mp4
    05:11
  • 93 - Certificate Authorities and their history.mp4
    04:23
  • 94 - Understanding Types of CAs Public vs Private.mp4
    03:16
  • 95 - Hierarchical Trust Model Example.mp4
    05:24
  • 96 - Hierarchical Trust Model Overview and Best Practices.mp4
    05:07
  • 97 - What is a Root CA.mp4
    06:03
  • 98 - The Need for Intermediate Certificate Authorities.mp4
    06:18
  • 99 - What are CRLs.mp4
    02:34
  • 100 - The need for OCSPs.mp4
    02:54
  • 101 - How does the browser identify the OCSP Server.mp4
    03:59
  • 102 - What are Self Signed Certificates.mp4
    02:49
  • 103 - What are Third party Certificates.mp4
    03:32
  • 104 - What is a CSR What are its Key Components.mp4
    05:10
  • 105 - Wild Card Certificates.mp4
    03:11
  • 106 - Buying a domain Lab.mp4
    03:04
  • 106 - Heres-a-step-by-step-guide-to-encrypting-your-web-application-on-a-Linux-based-system.pdf
  • 107 - Building a Linux VM.mp4
    02:24
  • 108 - Mapping A record in DNS.mp4
    01:49
  • 109 - Configuring the webserver with LetsEncrypt certificate.mp4
    05:28
  • 110 - Verifying the LetsEncrypt Certificate chain of Trust.mp4
    04:02
  • 111 - Certbot Supporting and helpful commands.mp4
    04:23
  • 112 - Its LAB Time What next Step by Step Verifying SELF SIGNED KEYS.mp4
    12:31
  • 112 - Self-Signed-Certificate-Step-by-Step-Lab.pdf
  • Description


    Vol 1: Mastering Core Cybersecurity Fundamentals & Concepts

    What You'll Learn?


    • Compare and Contrast various types of security concerns
    • Summarize fundamental security concepts
    • Explain the importance of change mangement processes and the impact to IT security
    • Explain the importance of using appropriate cryptographics solutions
    • understanding of different security threats, such as viruses, worms, trojans, phishing, ransomware, and insider threats.
    • key security concepts including confidentiality, integrity, availability (the CIA triad), authentication, authorization, and accountability
    • a structured approach to transitioning individuals, teams, and organizations from a current state to a desired future state
    • isks associated with poorly managed changes and how proper change management processes can mitigate these risks.
    • delve into the world of cryptography, teaching students about encryption, decryption, cryptographic algorithms, and key management.
    • the critical role of cryptography in securing data in transit and at rest, and how to apply cryptographic solutions appropriately in different scenarios.

    Who is this for?


  • IT Professionals
  • Aspiring Cybersecurity Specialists
  • Security Analysts and Consultants
  • Software Developers
  • Business and Technology Managers
  • Students in Computer Science or Related Fields
  • Technology Enthusiasts and Hobbyists
  • Career Changers
  • Students in Technology and Cybersecurity Programs
  • Military and Government Personnel
  • IT Professionals Needing a Refresher
  • IT Professionals Seeking Certification
  • Entry-Level Cybersecurity Professionals
  • What You Need to Know?


  • Basic Understanding of Computer Networks
  • amiliarity with fundamental networking concepts, such as TCP/IP, DNS, and routing, will be beneficial.
  • A basic understanding of how operating systems (like Windows, Linux, and macOS) function
  • Familiarity with command line interfaces.
  • An understanding of basic cybersecurity concepts, such as encryption, authentication, and the CIA triad (Confidentiality, Integrity, Availability), will be advantageous.
  • A keen interest in cybersecurity, a willingness to learn, and a proactive approach to problem-solving are essential.
  • Since this course may involve practical exercises and demonstrations, a computer with reliable internet access is necessary.
  • An awareness of the legal and ethical considerations in cybersecurity
  • More details


    Description

    This course is the Module 1 - General Security Concepts from CompTIA Security+ 701 . Here is the course outline.

    Key Learning Areas:

    1. Security Controls:

      • Categories: Delve into Technical, Managerial, Operational, and Physical security controls.

      • Types: Explore Preventive, Deterrent, Detective, Corrective, Compensating, Directive controls, each essential for a well-rounded security strategy.

    2. Fundamental Security Concepts:

      • CIA Triad: Deep dive into Confidentiality, Integrity, and Availability - pillars of information security.

      • Non-repudiation: Ensuring data integrity and authenticity.

      • AAA Framework: Comprehensive coverage of Authentication, Authorization, Accounting - cornerstones of access control.

        • Techniques for authenticating people and systems.

        • In-depth look at authorization models.

      • Zero Trust Model: Modern approach to security in a perimeter-less world.

        • Emphasis on adaptive identity and policy-driven access control.

        • Strategies for threat scope reduction.

      • Physical Security Measures:

        • Understanding the significance of physical barriers, access controls, and surveillance in cybersecurity.

    3. Change Management in Security:

      • Business Processes: Analyzing the impact of security operations, from stakeholder involvement to backout plans.

      • Technical Implications: Navigating challenges of allow/deny lists, managing downtime, and understanding legacy system vulnerabilities.

      • Documentation: Critical role of accurate documentation, policy updates, and the importance of version control in security.

    4. Cryptographic Solutions:

      • Public Key Infrastructure (PKI): Foundations of public and private keys, and the concept of key escrow.

      • Encryption:

        • Various levels of encryption: Full-disk, Partition, File, Volume, Database, Record.

        • Insights into transport/communication encryption, and the distinction between asymmetric and symmetric encryption methods.

      • Tools: Introduction to Trusted Platform Module (TPM), Hardware Security Module (HSM), and Key Management Systems.

      • Additional Concepts: Exploring Steganography, Tokenization, Data Masking, Hashing, Salting, Digital Signatures, Key Stretching.

    Course Benefits:

    • Builds a solid foundation in cybersecurity essentials, vital for securing digital assets.

    • Prepares participants comprehensively for the CompTIA Security+ SY0-701 certification exam.

    • Enhances understanding of current security risks, vulnerabilities, and effective mitigation strategies.

    • Equips learners with practical knowledge and skills, applicable across various IT and cybersecurity roles.

    • Facilitates a deeper comprehension of the evolving cybersecurity landscape, preparing participants for future challenges and innovations.

    Who this course is for:

    • IT Professionals
    • Aspiring Cybersecurity Specialists
    • Security Analysts and Consultants
    • Software Developers
    • Business and Technology Managers
    • Students in Computer Science or Related Fields
    • Technology Enthusiasts and Hobbyists
    • Career Changers
    • Students in Technology and Cybersecurity Programs
    • Military and Government Personnel
    • IT Professionals Needing a Refresher
    • IT Professionals Seeking Certification
    • Entry-Level Cybersecurity Professionals

    User Reviews
    Rating
    0
    0
    0
    0
    0
    average 0
    Total votes0
    Focused display
    Category
    Anand Rao Nednur
    Anand Rao Nednur
    Instructor's Courses
    Anand Rao is a senior technical instructor and cloud consultant. He has worked with large enterprises for about 15 years and has a wide range of technologies in his portfolio. Anand is adept at not just cloud platforms (Azure , AWS and GCP) but also well-versed with IAM, security and automation with powershell and python.In addition, he has been developing and updating the content for various courses. He has been assisting many engineers in the lab examinations and securing certifications.Anand Rao has delivered instructor led trainings in several states in India as well as several countries like USA, Bahrain, Kenya and UAE. He has worked as a Microsoft Certified Trainer globally for Corporate Major Clients.Anand is also a Certified seasoned professional holding certifications in following platforms:     Microsoft Certified Trainer ( MCT )     SY0-401 : CompTIA Security +     Scrum Certified master ( SCRUM )     ITIL V3      Certified Network Defender ( CND – EC-Council )     Certified Ethical hacker  ( CEH – EC-Council )     70-640 MS Active Directory     70-533 MS Azure Administration     70-534 MS Azure Architecture     AWS certified solutions Architect – Associate     AWS certified sysops administrator – Associate     Google Cloud Platform-Cloud Architect (GCP)     Certified Cloud Security Knowledge ( CCSK )     SC 900, SC 200 & SC -300Note: Anand also manages channel "The Cloud Mentor" in youtube. Feel free to subscribe to AWS and Azure. Share, Learn, Subscribe.
    Students take courses primarily to improve job-related skills.Some courses generate credit toward technical certification. Udemy has made a special effort to attract corporate trainers seeking to create coursework for employees of their company.
    • language english
    • Training sessions 112
    • duration 7:23:57
    • Release Date 2024/04/13