Companies Home Search Profile

Technologies and Tools for CompTIA Security+

Focused View

Christopher Rees

3:31:17

83 View
  • 01 - Module Intro.mp4
    04:12
  • 02 - TCP_IP and OSI Models.mp4
    02:00
  • 03 - Firewalls.mp4
    06:22
  • 04 - Application Firewall.mp4
    02:14
  • 05 - VPN.mp4
    04:11
  • 06 - Transport Encryption.mp4
    01:31
  • 07 - Intrusion Detection and Prevention.mp4
    05:53
  • 08 - IDS Component Workflow.mp4
    01:20
  • 09 - Four Approaches to IDS.mp4
    01:56
  • 10 - Network Based IDS.mp4
    02:10
  • 11 - Reacting to Alerts_issues.mp4
    02:52
  • 12 - Routers.mp4
    02:34
  • 13 - Switches.mp4
    02:18
  • 14 - Layer 2 vs. Layer 3.mp4
    01:05
  • 15 - Load Balancers.mp4
    01:25
  • 16 - Load Balancer Terms.mp4
    02:53
  • 17 - Web Security Gateways.mp4
    01:51
  • 18 - Port Security.mp4
    04:03
  • 19 - Loop Protection and Flood Controls.mp4
    02:08
  • 20 - Data Loss Prevention (DLP).mp4
    02:42
  • 21 - Spanning Tree Protocol (STP).mp4
    03:42
  • 22 - Access Points_WiFi Security.mp4
    02:34
  • 23 - Security Information and Event Management (SIEM).mp4
    02:25
  • 24 - Network Access Control (NAC).mp4
    02:36
  • 25 - Hardware Based Encryption.mp4
    01:35
  • 26 - Mail Gateway.mp4
    00:39
  • 27 - Additional Things to Consider.mp4
    02:14
  • 28 - Module Overview and Interpreting the Results.mp4
    02:30
  • 29 - Protocol Analyzers.mp4
    00:51
  • 30 - Network Scanners.mp4
    01:35
  • 31 - Rogue Machine Detection.mp4
    00:46
  • 32 - Port Scanner.mp4
    01:23
  • 33 - Wireless Scanners.mp4
    00:57
  • 34 - Vulnerability Scanner.mp4
    01:52
  • 35 - Exploitation Frameworks.mp4
    02:06
  • 36 - Data Sanitization Tools.mp4
    05:01
  • 37 - Steganography.mp4
    02:15
  • 38 - Honeypots.mp4
    01:48
  • 39 - Backup Utilities.mp4
    02:14
  • 40 - Banner Grabbing.mp4
    01:12
  • 41 - Passive vs. Active Tools.mp4
    01:02
  • 42 - Command Line Tools.mp4
    04:13
  • 43 - Module Intro_why Should You Care.mp4
    02:35
  • 44 - Unencrypted Credentials.mp4
    01:37
  • 45 - Log and Event Anomalies.mp4
    01:57
  • 46 - Access Violations.mp4
    02:18
  • 47 - Certificate Issues_certificate Hierarchy.mp4
    02:50
  • 48 - Mis-configured Devices.mp4
    01:16
  • 49 - Weak Security Configurations.mp4
    01:27
  • 50 - Personnel Issues.mp4
    04:30
  • 51 - Unauthorized Software.mp4
    01:49
  • 52 - Baseline Deviation.mp4
    05:28
  • 53 - Asset Management.mp4
    01:03
  • 54 - Authentication Issues.mp4
    01:55
  • 55 - Module Intro.mp4
    00:51
  • 56 - HIDS_HIPS.mp4
    01:01
  • 57 - Anti-virus.mp4
    03:26
  • 58 - File Integrity Checks.mp4
    01:32
  • 59 - Host-based Firewalls.mp4
    01:18
  • 60 - Removable Media Controls.mp4
    01:36
  • 61 - Advanced Malware and Patch Management Tools.mp4
    03:57
  • 62 - Unified Threat Management (UTM).mp4
    01:04
  • 63 - Data Loss Prevention (DLP).mp4
    01:22
  • 64 - Data Execution Prevention (DEP).mp4
    02:17
  • 65 - Module Intro and Cellular Risks.mp4
    07:24
  • 66 - Securing WiFi.mp4
    01:39
  • 67 - Near Field Communication (NFC).mp4
    01:19
  • 68 - Additional Areas of Concern (SATCOM, Bluetooth, Infrared).mp4
    02:27
  • 69 - Device Security.mp4
    04:04
  • 70 - Application Security and Key_credential Management.mp4
    02:56
  • 71 - Authentication.mp4
    01:50
  • 72 - Geo-tagging.mp4
    01:32
  • 73 - Context-aware Authentication.mp4
    02:06
  • 74 - Enforcement and Monitoring.mp4
    04:22
  • 75 - BYOD Concerns and Deployment Models.mp4
    03:51
  • 76 - Additional BYOD Concerns.mp4
    02:50
  • 77 - Module Review.mp4
    00:35
  • 78 - Module Intro_why Should You Care.mp4
    01:31
  • 79 - Secure Protocols and Networking Protocols.mp4
    03:46
  • 80 - DNSSEC.mp4
    03:49
  • 81 - SSH.mp4
    01:19
  • 82 - S_MIME.mp4
    01:03
  • 83 - SRTP.mp4
    00:43
  • 84 - LDAPS.mp4
    01:00
  • 85 - FTPS and SFTP.mp4
    01:36
  • 86 - SNMPv3.mp4
    01:17
  • 87 - SSL_TLS.mp4
    01:04
  • 88 - HTTPS.mp4
    01:30
  • 89 - Secure POP_IMAP.mp4
    02:54
  • 90 - Use Cases and Module Review.mp4
    04:31
  • comptia-security-plus-technologies-tools.zip
  • Description


    IT Security is one of the fastest-growing and most in-demand skillsets in IT. This course focuses on the tools and technologies required to deploy and troubleshoot a company's security infrastructure.

    What You'll Learn?


      IT Security comprises many different areas and organizations that need skilled IT security personnel who understand the tools and technologies required to architect, deploy, maintain, and troubleshoot the infrastructure required to keep a company's data secure. In this course, Technologies and Tools for CompTIA Security+, you'll learn the networking components (hardware and software) required to maintain organizational security. First, you'll explore the concepts required to troubleshoot and remediate issues. Next, you'll discover the tools required to properly assess a company's security posture, including network scanners, protocol analyzers, vulnerability scanning, and exploitation frameworks. Finally, you'll learn the infrastructure and security concerns dealing with mobile device deployment, including the protocols, devices, and infrastructure needed to secure a company's assets. By the end of this course, you'll understand the various technologies and tools required to assess a company's security posture, identify gaps in their defenses, and recommend solutions to mitigate those risks.

    More details


    User Reviews
    Rating
    0
    0
    0
    0
    0
    average 0
    Total votes0
    Focused display
    Christopher Rees
    Christopher Rees
    Instructor's Courses
    Chris is a professional information technologist, trainer, manager and lifelong learner. He is married with 3 beautiful children and interested in martial arts, working out, spending time with family and friends and being creative whenever possible. He has created a number of IT Certification training courses over the past 10 years and really enjoys helping people advance their careers through training and personal development.
    Pluralsight, LLC is an American privately held online education company that offers a variety of video training courses for software developers, IT administrators, and creative professionals through its website. Founded in 2004 by Aaron Skonnard, Keith Brown, Fritz Onion, and Bill Williams, the company has its headquarters in Farmington, Utah. As of July 2018, it uses more than 1,400 subject-matter experts as authors, and offers more than 7,000 courses in its catalog. Since first moving its courses online in 2007, the company has expanded, developing a full enterprise platform, and adding skills assessment modules.
    • language english
    • Training sessions 90
    • duration 3:31:17
    • level preliminary
    • Release Date 2023/02/28