->
Oreilly - CompTIA Security+ SY0-401 - 100000006A0500
Oreilly - CompTIA Security+ SY0-401
by Stone River eLearning | Publisher: Stone River eLearning | Release Date: January 2019 | ISBN: 100000006A0500


CompTIA's Security+ is a vendor-neutral certification that validates the competency of security professionals working in the IT industry. The Security Plus Certification confirms a technician's critical knowledge of communication security, infrastructure security, cryptography, operational security, and general security concepts. Because human error is the number one cause for a network security breach, CompTIA Security+ is recognized by the technology community as a valuable credential that proves competency with information security.
  1. Course Introduction 00:00:20
  2. General Security Concepts 00:00:21
  3. Security+ Exam Domains 00:03:34
  4. Basic Terminology 00:03:27
  5. Additional Security Goals 00:04:46
  6. Host Security 00:04:46
  7. Additional Security Concepts 00:05:25
  8. Module 1 Close 00:00:11
  9. Organizational Security 00:00:18
  10. What is a Security Program 00:01:37
  11. Operational Process 00:03:30
  12. Password Policies 00:03:11
  13. Demo - Password Policies 00:03:38
  14. Social Engineering 00:02:48
  15. Security Policies 00:03:20
  16. Concepts the Support Policies 00:03:38
  17. Human Resources Policies 00:02:23
  18. Module 2 Close 00:00:15
  19. Privacy, Ethics and Legal issues 00:00:25
  20. Cybercrime 00:03:55
  21. Reactions to Cybercrime Part1 00:04:00
  22. Reactions to Cybercrime Part2 00:05:21
  23. Module 3 Close 00:00:19
  24. Cryptography 00:00:19
  25. Cryptography Explained 00:04:43
  26. Ciphers 00:02:33
  27. Cryptographic Math and Hashing 00:04:07
  28. Algorithms and Encryption Part1 00:04:41
  29. Algorithms and Encryption Part2 00:04:27
  30. Algorithms and Encryption Part3 00:05:43
  31. Symmetric and Asymmetric Working Together 00:04:02
  32. Digital Signatures 00:04:46
  33. Module 4 Close 00:00:17
  34. Public Key Infrastructure 00:00:21
  35. Basics of Public Key Infrastructures 00:05:52
  36. Certificate Hierarchies 00:06:04
  37. Trust and Certificate Verification 00:04:08
  38. Types of Certificates and Extensions 00:03:47
  39. Certificate Revocation List 00:04:51
  40. Key Protection 00:04:36
  41. Key Recovery 00:05:03
  42. Trust Models 00:05:02
  43. Module 5 Close 00:00:24
  44. Standards and Protocols 00:00:28
  45. Standards and Protocols Supporting PKI 00:05:26
  46. SSL and TLS 00:05:23
  47. S/MIME 00:04:57
  48. IPsec 00:02:58
  49. Common Criteria - CC 00:03:47
  50. Module 6 Close 00:00:35
  51. Physical Security 00:00:24
  52. Physical Security Measures 00:04:41
  53. Access Controls and Monitoring 00:06:05
  54. Biometrics 00:03:45
  55. Module 7 Close 00:00:27
  56. Infrastructure Security 00:00:30
  57. Infrastructure Security - Printers and Workstations 00:04:45
  58. Servers and Devices 00:07:08
  59. VLANs and Firewalls 00:09:17
  60. Securing Wireless Access Points 00:05:23
  61. VPN - Network Access Control 00:05:07
  62. Network Monitoring 00:06:14
  63. Handling Big Data and Physical Security 00:04:33
  64. Security Zones, VLANs and NAT 00:03:47
  65. Virtualization and Cloud Computing 00:04:32
  66. Module 8 Close 00:00:18
  67. Authentication and Remote Access 00:00:17
  68. Remote Access and Kerberos 00:04:48
  69. Alternatives to Passwords 00:05:34
  70. Other Protocols 00:04:29
  71. Federated Authentication 00:03:09
  72. HOTP and TOTP 00:07:25
  73. Remote Access Protocols Authentication 00:03:50
  74. Module 9 Close 00:00:16
  75. Wireless Security 00:00:22
  76. Wireless Networking 00:05:17
  77. Bluetooth 00:06:27
  78. Controlling the Radio Waves 00:04:12
  79. WPA Encryption 00:03:25
  80. Module 10 Close 00:00:12
  81. Intrusion Detection Systems 00:00:21
  82. Intrusion Detection Systems - HIDs 00:05:17
  83. HIDs Advancements and Anti-Virus 00:04:04
  84. Demo - Windows Defender 00:03:50
  85. Network-Based IDSs 00:04:10
  86. Content-Based Signatures and Proxy Servers 00:06:33
  87. Protocol Analyzers 00:03:25
  88. Anti-Spam Techniques 00:03:26
  89. Module 11 Close 00:00:13
  90. Security Baselines 00:00:14
  91. Overview of Baselines 00:04:50
  92. Operating System Hardening 00:07:37
  93. Demo - Windows Update 00:03:20
  94. Network Hardening 00:02:47
  95. Application Hardening and Patch Management Part1 00:02:53
  96. Application Hardening and Patch Management Part2 00:03:58
  97. Module 12 Close 00:00:15
  98. Attacks and Malicious Software 00:00:08
  99. Avenues of Attack 00:04:54
  100. Minimizing Possible Avenues of Attack 00:06:48
  101. DDOS Mitigation 00:02:30
  102. Null Sessions and Privilege Escalation 00:03:44
  103. IP Address Spoofing 00:05:35
  104. Replay Attacks and TCP/IP Hijacking 00:06:50
  105. Password Attacks and Software Exploitation 00:04:48
  106. Viruses 00:04:24
  107. Other Malware 00:06:17
  108. Module 13 Close 00:00:18
  109. E-mail and Instant Messaging 00:00:10
  110. End User Issues with Email 00:03:49
  111. Enterprise Mitigation Techniques 00:02:53
  112. Module 14 Close 00:00:10
  113. Web Components 00:00:09
  114. Web Components and Concerns 00:05:24
  115. HTTP and HTTPS 00:05:27
  116. Code-Based Vulnerabilities 00:05:01
  117. Mitigations and Cookies 00:03:08
  118. Application-Based Weaknesses 00:02:01
  119. Module 15 Close 00:00:23
  120. Disaster Recovery and Business Continuity 00:00:17
  121. Disaster Recovery 00:05:02
  122. Backups 00:04:43
  123. Storage Considerations 00:02:41
  124. Raid 00:05:23
  125. Module 16 Close 00:00:15
  126. Risk Management 00:00:16
  127. Risk Management Key Terms 00:05:40
  128. Risk Management Process 00:04:39
  129. General Risk Management Model 00:04:16
  130. Software Engineering Institute Model 00:05:03
  131. Common Objective Approach 00:04:43
  132. Security Integration Issues with Third Parties 00:02:29
  133. Module 17 Close 00:00:26
  134. Change Management 00:00:30
  135. Change Management Procedures 00:04:10
  136. Change Management Workflow 00:02:28
  137. Maintaining Code Integrity 00:02:44
  138. Module 18 Close 00:00:18
  139. Privilege Management 00:00:18
  140. Privilege Management Details 00:03:54
  141. Centralized Management 00:04:42
  142. Access Control Models 00:05:40
  143. Module 19 Close 00:00:15
  144. Computer Forensics 00:00:13
  145. Computer Forensics and Evidence 00:05:16
  146. The Investigative Process 00:05:09
  147. Module 20 Close 00:00:17
  148. Oreilly - CompTIA Security+ SY0-401

    100000006A0500.CompTIA.Security.SY0401.part1.OR.rar

    100000006A0500.CompTIA.Security.SY0401.part2.OR.rar

    100000006A0500.CompTIA.Security.SY0401.part3.OR.rar


 TO MAC USERS: If RAR password doesn't work, use this archive program: 

RAR Expander 0.8.5 Beta 4  and extract password protected files without error.


 TO WIN USERS: If RAR password doesn't work, use this archive program: 

Latest Winrar  and extract password protected files without error.


 Coktum   |  

Information
Members of Guests cannot leave comments.




rss