Video description
This course begins with core cybersecurity concepts, creating a solid base for in-depth security management study. It dives into security principles, authentication factors, and control types, establishing fundamental cybersecurity knowledge.
The course covers topics such as Zero Trust, physical security, and encryption complexities, including Public Key Infrastructure and digital certificates. The course also explores the diverse threat landscape, from social engineering to cloud and virtualization vulnerabilities, providing a comprehensive understanding of cyber threats.
The course investigates various attack indicators, like malware and network attacks, boosting your threat identification and response capabilities. Key security infrastructure elements, including firewalls and secure communication, are discussed. The course also emphasizes practical applications in identity and access management, wireless security, and network device security. Vulnerability analysis and digital forensics are examined, readying you for both proactive and reactive cybersecurity roles.
Concluding with governance, risk management, and compliance, this course prepares you for real-world cybersecurity challenges, making it a crucial tool for aspiring professionals.
What you will learn
- Understand security control categories
- Learn Zero Trust and physical security
- Explore encryption and PKI solutions
- Identify and mitigate digital threats
- Secure networks and communication
- Implement comprehensive cybersecurity measures
Audience
This course is ideal for IT professionals, security analysts, network administrators, and anyone aspiring to specialize in cybersecurity. A foundational understanding of IT and basic security concepts is recommended. The course is perfect for those seeking to enhance their cybersecurity skills and apply them in various IT and network security roles.
About the Authors
ACI Learning: ACI Learning train leaders in Cybersecurity, Audit, and Information Technology. Whether you're starting your IT career, mastering your profession, or developing your team, they're with you every step of the way.
Wes Bryan: Wes Bryan, our Edutainer, began his IT journey in 2009 and transitioned into IT instruction. He earned global teaching awards three times during his early teaching years and holds certifications including CompTIA A+, Network+, Security+, Server+, Cloud+, CySA+, MCSA, MTA, MCTS, MCP, MS, and MCT.
Anthony Sequeira: Anthony Sequeira, our Edutainer, boasts a robust IT career since 1996 and a love for technology from various vendors. His extensive certifications cover CCIE R&S #15626, AWS, Cisco, CompTIA, Juniper, and Microsoft.
Daniel Lowrie: Daniel Lowrie, our show host, shifted to IT education after successful roles as a systems administrator and network administrator. His certifications include CompTIA A+, Network+, Linux+, CySA+, PenTest+, CEH, MCSA, CFR, and eJPT.
Sophie Goodwin: Sophie Goodwin, with 8+ years of experience as a film and voice talent, enriches our team with on-camera and voice-over expertise spanning eLearning content, independent films, TV & web commercials, and video games. Her qualifications include a Bachelor of Science in Telecommunication and (ISC)² CC certification in Cybersecurity.
Table of contents
- Chapter 1 : Course Overview
-
Chapter 2 : General Security Concepts
- Examining Security Control Categories
- Examining Security Control Types
- Examining the Principles of Security
- Examining Authentication Factors
- Examining Authorization and Access Control Models
- Examining Authentication, Authorization, and Accounting (AAA)
- Examining the Principles of Zero Trust
- Examining Physical Security
- Examining Deception and Disruption Technology
- Business Processes and Security Operations
- Change Management Implications Documentation
- Examining Encryption Solutions
- Examining Public Key Infrastructure (PKI)
- Examining Digital Certificates
- Examining Asymmetric Encryption
- Examining Symmetric Encryption
- Examining Hashing and Obfuscation
-
Chapter 3 : Threats, Vulnerabilities, and Mitigation
- Threat Actors
- Social Engineering
- Business Email Compromise
- Digital System Threats
- Network Based Threats
- Removable Media Threats
- Supply Chain Attacks
- Application Vulnerabilities
- Operating System Vulnerabilities
- Web Based Vulnerabilities
- Hardware Vulnerabilities
- Cloud Vulnerabilities
- Virtualization Vulnerabilities
- Cryptographic Vulnerabilities
- Mobile Device Vulnerabilities
- Zero Day Vulnerabilities
- Indicators of Malware Attacks
- Indicators of Physical Attacks
- Indicators of Network Attacks
- Indicators of Application Attacks
- Indicators of Cryptographic Attacks
- Indicators of Password Attacks
- Cybersecurity Mitigation Techniques
-
Chapter 4 : Security Architecture
- Cloud-Related Concepts
- Network Infrastructure Concepts
- Virtualization Concepts
- IoT and SCADA
- Architectural Model Considerations
- Security Infrastructure Considerations
- Network Appliances
- Port Security
- Firewall Types
- Secure Communication and Access
- Selecting Effective Controls
- Data Types
- Data Classifications
- Data Considerations
- Methods to Secure Data
- HA and Site Considerations
- Platform Diversity and Multi-Cloud Systems
- Continuity of Operations and Capacity Planning
- Testing
- Backups
- Power
-
Chapter 5 : Security Operations
- Examining Identity and Access Management
- Examining Wireless Security
- Examining Operating System Security
- Examining Firewalls and Intrusion Detection Devices
- Examining Password Security
- Examining Web Filtering
- Examining the Incident Response Process and Activities
- Examining Endpoint Detection and Response (EDR)
- Examining Single Sign-on
- Examining Secure Network Protocols and Services
- Examining Automation and Scripting Uses
- Examining Asset Management
- Examining Privileged Identity Management
- Examining Application Security
- Examining Investigation Data Sources and Log Data
- Examining Security for Mobile Devices
- Examining Vulnerability Analysis
- Examining Digital Forensics Activities
- Vulnerability Response, Remediation and Reporting
- Examining Security Baselines and Hardening
- Examining User Onboarding and Offboarding
- Examining Email Security
- Examining Security Monitoring and Alerting
- Identifying Vulnerabilities
-
Chapter 6 : Security Programs Management and Oversight
- Guidelines and Policies
- Standards and Procedures
- External Considerations and Revisions
- Governance Structures
- Roles and Responsibilities
- Risk Identification and Assessment
- Risk Analysis
- Risk Register, Tolerance, and Appetite
- Risk Management Strategies
- Risk Reporting And BIA
- Vendor Assessment and Selection
- Agreement Types
- Additional Vendor Considerations
- Compliance
- Compliance Monitoring
- Privacy
- Attestation
- Audits
- Penetration Testing
- Phishing
- Anomalous Behavior Recognition
- User Guidance and Training
- Reporting and Monitoring
- Development and Execution
Product information
- Title: CompTIA Security+ (SY0-701)
- Author(s):
- Release date: December 2023
- Publisher(s): Packt Publishing
- ISBN: 9781835881446
You might also like
video
CompTIA Security+ SY0-701
27+ Hours of Video Instruction Get the edge you need to successfully study for the CompTIA …
video
CompTIA Security+ SY0-601
23+ Hours of Video Instruction Get intensive, hands-on CompTIA Security+ training with Sari Greene in this …
video
CompTIA Network+ (N10-008)
The course begins by grounding you in the OSI and TCP/IP models, network topologies, and types, …
video
CompTIA Network+ N10-008
36 Hours of Video Instruction Overview CompTIA Network+ N10-008 Complete Video Course is a comprehensive training …