CompTIA Security+ Exam Prep

Video description

The CompTIA Security+ Exam Prep will be targeted towards both new learners and professionals. One of the major issues within the cybersecurity realm is that IT professionals are not able to identify both internal and external threats that are affecting their organization. By completing this video series, you will be able to understand the baseline of IT security practices, policies, tools, types of attacks, and vulnerabilities, and how to prevent and mitigate those threats. This video series also prepares you for the official CompTIA Security+ SY0-501 certification.

Table of contents

  1. Chapter 1: Fundamentals of Information Technology
    1. Course Overview
    2. Introduction
    3. Safety and Professionalism
    4. Essentials of Computing
    5. Types of RAM
    6. Fundamentals of Motherboards
    7. Power Supply Unit
    8. Mass Storage Devices
  2. Chapter 2: Threats, Attacks, and Vulnerabilities
    1. Introduction
    2. Identifying Indicators of Compromise (IoC)
    3. Comparing Different Types of Attacks – Social Engineering
    4. Comparing Different Types of Attacks – Application Attacks
    5. Comparing Different Types of Attacks – Wireless Attacks
    6. Comparing Different Types of Attacks – Cryptographic Attacks
    7. Understanding Threat Actors
    8. Understanding the Need for Penetration Testing
    9. Learning About the Concepts of Vulnerability Scanning
    10. Types of Vulnerabilities
  3. Chapter 3: Technologies Tools
    1. Introduction
    2. Network Security Components – Firewalls and VPN
    3. Network Security Components – Network Devices
    4. Network Security Components – Proxies and Load Balancers
    5. Network Security Components – Wireless Devices
    6. Network Security Components – Other Security Devices
    7. Using Security Tools to Assess Security Posture – Software Tools
    8. Using Security Tools to Assess Security Posture – CLI Tools
    9. Understanding Common Security Issues
    10. Understanding Security Technologies
    11. Securing Mobile Devices - Connection
    12. Securing Mobile Devices - Management
    13. Securing Mobile Devices - Enforcement
    14. Securing Mobile Devices - Deployment
    15. Implementing Secure Protocols
  4. Chapter 4: Architecture Design
    1. Introduction
    2. Understanding Frameworks and Best Practices
    3. Secure Configuration
    4. Secure Network Architecture – Zones Topologies
    5. Secure Network Architecture – Network Segmentation
    6. Secure Network Architecture – VPN
    7. Secure Network Architecture – Device Placement
    8. Implementing Secure Systems – Hardware Firmware Security
    9. Implementing Secure Systems – Operating System Security
    10. Implementing Secure Systems – Peripherals
    11. Understanding the Importance of Secure Staging Concepts
    12. Understanding Security Issues with Embedded Systems
    13. Secure Application Development – Life Cycle Models
    14. Secure Application Development – Version Control, Change Management, and Provisioning
    15. Secure Application Development – Secure Coding Concepts
    16. Secure Application Development – Code Quality and Testing
    17. Security in Cloud and Virtualization Concepts
    18. Understanding Resiliency and Automation Strategies to Reduce Risk
    19. Implementing Physical Security Controls
  5. Chapter 5: Identity Access Management
    1. Introduction
    2. Understanding Identity and Access Management
    3. Configuring Identity and Access Services – Part 1
    4. Configuring Identity and Access Services – Part 2
    5. Implementing Identity and Access Management Controls
    6. Account Management Practices – Part 1
    7. Account Management Practices – Part 2
  6. Chapter 6: Risk Management
    1. Introduction
    2. Understanding the Importance of Policies, Plans, and Procedures – Part 1
    3. Understanding the Importance of Policies, Plans, and Procedures – Part 2
    4. Understanding the Importance of Policies, Plans, and Procedures – Part 3
    5. Business Impact Analysis Concepts
    6. Risk Management Processes
    7. Incident Response Procedures – Part 1
    8. Incident Response Procedures – Part 2
    9. Building and Planning Effective Business Continuity Plans
    10. Computer Forensics Concepts – Part 1
    11. Computer Forensics Concepts – Part 2
    12. Understanding Disaster Recovery and Continuity of Operations – Part 1
    13. Understanding Disaster Recovery and Continuity of Operations – Part 2
    14. Understanding Types of Controls
    15. Data Security and Privacy Practices
  7. Chapter 7: Cryptography PKI
    1. Introduction
    2. Understanding the Concepts of Cryptography – Part 1
    3. Understanding the Concepts of Cryptography – Part 2
    4. Understanding the Concepts of Cryptography – Part 3
    5. Describing the Characteristics of Cryptography Algorithms – Part 1
    6. Describing the Characteristics of Cryptography Algorithms – Part 2
    7. Implementing Wireless Security
    8. Understanding Public Key Infrastructure (PKI) – Part 1
    9. Understanding Public Key Infrastructure (PKI) – Part 2

Product information

  • Title: CompTIA Security+ Exam Prep
  • Author(s): Glen Singh
  • Release date: September 2020
  • Publisher(s): EC-Council
  • ISBN: None