Companies Home Search Profile

CompTIA Security+ (SY0-701) Practical Skills

Focused View

Jobskillshare Community

11:38:04

307 View
  • 1 - Introduction.mp4
    06:18
  • 2 - Free 10 Days Practice Exam Information.html
  • 3 - Quick Prerequisite or Expectation Check.html
  • 4 - Build a Sec Home Lab.mp4
    01:09:35
  • 5 - Trainer Knowledge Share Video.mp4
    28:42
  • 6 - Introduction Security Concept Fundamentals.mp4
    02:31
  • 7 - Exercise 1 Configure RAID 1.mp4
    08:52
  • 8 - Exercise 2 Configure and Test File Integrity Monitoring.mp4
    09:41
  • 9 - Interview Questions Answers.html
  • 10 - Introduction Cryptographic Solutions.mp4
    01:12
  • 11 - Exercise 1 Create and Verify a Digital Signature.mp4
    15:51
  • 13 - Interview Questions and Answers.html
  • 14 - Trainer Knowledge Share Video.mp4
    26:06
  • 15 - Introduction Threat Vectors and Attack Surfaces.mp4
    01:01
  • 16 - Exercise 1 Open Service Ports.mp4
    09:04
  • 17 - Exercise 2 Default Credentials.mp4
    05:39
  • 18 - Exercise 3 Vulnerable Applications.mp4
    11:32
  • 19 - Interview Questions and Answers.html
  • 20 - Trainer Knowledge Share Video.mp4
    30:36
  • 21 - Introduction Identifying Security Vulnerabilities.mp4
    01:33
  • 22 - Exercise 1 Identify LM Hash Vulnerabilities.mp4
    16:00
  • 23 - Exercise 2 Identify DNS Transfer Vulnerabilities.mp4
    05:33
  • 24 - Interview Questions and Answers.html
  • 25 - Trainer Knowledge Share Video.mp4
    23:49
  • 26 - Introduction Analyze Malicious Activity.mp4
    01:02
  • 27 - Exercise 1 Observe Indications of a Brute Force Attack.mp4
    06:36
  • 28 - Exercise 3 Observe Indications of a SYN Flood Attack.mp4
    05:52
  • 29 - Interview Questions and Answers.html
  • 30 - Trainer Knowledge Share Video.mp4
    17:56
  • 31 - Introduction Mitigation Techniques.mp4
    00:54
  • 32 - Exercise 1 Configure Router Access.mp4
    08:14
  • 33 - Exercise 2 Harden Router Access.mp4
    06:33
  • 34 - Exercise 3 Configure Router Logging.mp4
    06:33
  • 35 - Trainer Knowledge Share Video.mp4
    12:48
  • 36 - Introduction Security Architecture Models.mp4
    01:01
  • 37 - Exercise 1 Create a VM.mp4
    04:52
  • 38 - Exercise 2 Use Containers.mp4
    09:09
  • 39 - Exercise 3 Complete VM Deployment.html
  • 40 - Trainer Knowledge Share Video.mp4
    12:45
  • 41 - Introduction Securing Enterprise Infrastructures.mp4
    00:58
  • 42 - Exercise 1 Install and Configure a VPN Server.mp4
    06:59
  • 43 - Exercise 2 Create a VPN User and Client.mp4
    04:57
  • 44 - Exercise 3 Configure a L2TPIPsec VPN.mp4
    06:19
  • 45 - Interview Questions and Answers.html
  • 46 - Trainer Knowledge Share Video.mp4
    15:19
  • 47 - Introduction Data Protection Strategies.mp4
    00:52
  • 48 - Exercise 1 Encryption.mp4
    04:05
  • 49 - Exercise 2 Hashing.mp4
    05:37
  • 50 - Exercise 3 Obfuscation.mp4
    04:08
  • 51 - Interview Questions and Answers.html
  • 52 - Trainer Knowledge Share Video.mp4
    11:32
  • 53 - Introduction Resilience in Security Architecture.mp4
    01:14
  • 54 - Exercise 1 Prepare WIN11 and Install EaseUS Todo Backup.mp4
    06:07
  • 55 - Exercise 2 Conduct and Restore from Incremental Backups.mp4
    08:25
  • 56 - Exercise 3 Conduct Differential Backups and Examine all Backup Files.mp4
    05:07
  • 57 - Exercise 4 Investigate the Archive Bit.mp4
    02:56
  • 58 - Trainer Knowledge Share Video.mp4
    15:05
  • 59 - Introduction Securing Computing Resources.mp4
    00:52
  • 60 - Exercise 1 Establish a Baseline.mp4
    03:54
  • 61 - Exercise 2 Input Validation.mp4
    07:14
  • 62 - Exercise 3 Sandboxing.mp4
    05:22
  • 63 - Trainer Knowledge Share Video.mp4
    15:27
  • 64 - Introduction Asset Management Techniques.mp4
    01:04
  • 65 - Exercise 1 Deploy an Asset and License.mp4
    12:27
  • 66 - Exercise 2 Secure Data Sanitization.mp4
    04:21
  • 67 - Introduction Vulnerability Management.mp4
    01:05
  • 68 - Trainer Knowledge Share Video.mp4
    12:40
  • 69 - Exercise 1 Detect Web Application Vulnerabilities.mp4
    09:18
  • 70 - Exercise 2 Monitor Devices for Vulnerabilities.mp4
    08:38
  • 71 - Interview Questions and Answers.html
  • 72 - Information Tips.html
  • 73 - Security Assessments and Tools Lecture.mp4
    07:48
  • 74 - Conduct a Software Vulnerability Scan Using AlienVault.mp4
    05:05
  • 75 - Conduct a Software Vulnerability Scan using Nessus.mp4
    05:12
  • 76 - Review a Template Incident Response Documentation.mp4
    03:16
  • 77 - Introduction Monitoring Computing Resources.mp4
    00:43
  • 78 - Exercise 1 Monitoring Device Resource Utilization.mp4
    09:06
  • 79 - Interview Questions and Answers.html
  • 80 - Trainer Knowledge Share Video.mp4
    10:39
  • 81 - Introduction Enhancing Enterprise Security.mp4
    00:50
  • 82 - Exercise 1 Linux Server Hardening Techniques.mp4
    05:39
  • 83 - Exercise 2 Windows Server Hardening Techniques.mp4
    06:08
  • 84 - Trainer Knowledge Share Video.mp4
    10:30
  • 85 - Introduction Implement Identity Access Management.mp4
    00:54
  • 86 - Exercise 1 Provisioning User Accounts on a Microsoft Server.mp4
    05:33
  • 87 - Exercise 2 Provisioning User Accounts on a Linux Server.mp4
    04:20
  • 88 - Trainer Knowledge Share Video.mp4
    11:10
  • 89 - Introduction Implementation of Automation Orchestration for Security Operation.mp4
    00:36
  • 90 - Exercise 1 Creating Automation Scripts.mp4
    09:23
  • 91 - Trainer Knowledge Share Video.mp4
    10:49
  • 92 - Introduction Investigative Data Sources.mp4
    00:30
  • 93 - Exercise 1 Log File Analysis.mp4
    07:13
  • 94 - Information Tips.html
  • 95 - Introductory Lecture Securing Cloud Infrastructure Resources.mp4
    03:17
  • 96 - Encrypt an Azure VM OS and Data Disks.mp4
    09:06
  • 97 - Investigating AWS Artifact.mp4
    04:23
  • 98 - Security Groups in AWS.mp4
    10:59
  • 99 - Next Course to take.html
  • 100 - Bonus Lecture.mp4
    05:03
  • Description


    CompTIA Security+ (SY0-701) practical skills

    What You'll Learn?


    • Security Concept Fundamentals
    • Threat Vectors and Attack Surfaces, Analyze Malicious Activity, Mitigation Techniques
    • Identifying Security Vulnerabilities, Security Architecture Models
    • Securing Enterprise Infrastructures, Data Protection Strategies
    • Resilience in Security Architecture, Securing Computing Resources
    • Asset Management Techniques, Vulnerability Management
    • Monitoring Computing Resources, Investigative Data Sources
    • Implementation of Automation & Orchestration for Security Operations

    Who is this for?


  • This course is designed for IT professionals looking to transition into cybersecurity in order to learn the technical skills and gain confidence
  • New Cybersecurity Analyst
  • What You Need to Know?


  • Basic Networking Foundation Knowledge, Basic Foundation of Linux Systems
  • More details


    Description

    Welcome to the Security+ (SY0-701) Practical Skills course. Upon completion of this course, you will have acquired hands-on experience in analyzing a network infrastructure for potential security vulnerabilities and implementing remediation strategies for these vulnerabilities.

    Through the completion of the modules, you will enhance your practical skills in identifying and fortifying a network infrastructure against cyber security threats. These modules are designed to align with the practical objectives and competencies outlined in the CompTIA Security+ certification exam (SY0-701).

    The CompTIA Security+ (SY0-701) exam serves as an entry-level cyber security certification, targeting IT security analysts, vulnerability analysts, threat intelligence analysts, or IT professionals aspiring to enter the industry.

    The content of this course emphasizes the practical aspects of the exam objectives. No prior hands-on experience is necessary to utilize or complete this Practice Lab. However, a foundational understanding of IT networking and basic Linux concepts is preferred to facilitate comprehension of the course content and labs.

    Throughout this course, we will utilize JSS labs. However, students are welcome to utilize home-based labs such as VirtualBox or other virtualization technologies. We will provide a video tutorial demonstrating a similar setup to our JSS labs, enabling you to replicate it should you choose to utilize home-based labs.

    Who this course is for:

    • This course is designed for IT professionals looking to transition into cybersecurity in order to learn the technical skills and gain confidence
    • New Cybersecurity Analyst

    User Reviews
    Rating
    0
    0
    0
    0
    0
    average 0
    Total votes0
    Focused display
    Category
    Jobskillshare Community
    Jobskillshare Community
    Instructor's Courses
    Our Managed Learning blends online on-demand video lectures with hands-on practice labs. Reinforce your knowledge by accessing REAL equipment online with no restrictions and full administrator privileges in real-time.Jobskillshare collaborates with industry leaders to provide the most hands-on IT training using TestOut and real-live practice labs. This unique approach allows students to gain valuable experience by developing real-world IT skills. Students can practice IT skills in a realistic environment without expensive equipment by simulating hardware, software, operating systems, and entire network environments.
    Students take courses primarily to improve job-related skills.Some courses generate credit toward technical certification. Udemy has made a special effort to attract corporate trainers seeking to create coursework for employees of their company.
    • language english
    • Training sessions 84
    • duration 11:38:04
    • Release Date 2024/06/16