Oreilly - CompTIA Security+ Certification (Exam SY0-401)
by VTC | Publisher: Virtual Training Company, Inc. | Release Date: March 2017 | ISBN: 9781618660329
Network and computer security used to be a high proiority, now security has become an absolute necessity. Understanding the fundamentals of network and computer security is a must in today's environment. CompTIA's Security+ certification is recognized around the world as validation that you know about the fundamental network and computer security practices and actions as well as the technologies involved. Earning the Security+ certification will open doors in the Information Technology workplace. In this course, Mark Long goes step-by-step to help you understand the various technologies and techniques to help you prepare for the CompTIA Security+ SY0-401 exam. Mark has been working in Information Technology for over 25 years and has worked in data security in the corporate environment and brings real-world knowledge to help you get ready for this exam.
- Welcome/intro
- Welcome/intro 00:01:27
- Course Overview 00:04:12
- Why Security+ 00:06:18
- About the Exam
- What to Expect on the Exam 00:03:27
- How to Prepare 00:06:16
- How to Take the Exam 00:05:31
- Computer Security Basics
- Security Basics 00:05:15
- Security Threats 00:05:17
- Securing Computer Hardware 00:06:14
- Securing Storage Devices 00:06:44
- Security Removable Media 00:05:04
- Securing Storage Devices Demo 00:03:08
- Malicious Software pt. 1 00:06:16
- Malicious Software pt. 2 00:05:27
- Preventing Malicious Software 00:04:59
- Understanding Physical Security 00:06:47
- Hardware Disposal 00:03:46
- Network Design
- Network Security Basics 00:06:49
- Understanding Firewalls 00:03:38
- Firewall Operations 00:05:38
- Network Address Translation 00:06:06
- Switches 00:05:19
- Routers 00:05:44
- Network Security Devices 00:06:41
- Understanding VLANs 00:05:15
- Cloud Computing Basics 00:05:55
- Cloud Computing Types 00:06:26
- Security in the Cloud 00:06:12
- Securing Servers 00:06:18
- Network Protocols and Threats
- Network Protocol Basics 00:06:51
- Understanding Ports 00:05:20
- Common Ports 00:04:50
- Network Attacks pt. 1 00:06:26
- Network Attacks pt. 2 00:06:54
- Honeypots and Honeynets 00:06:10
- Intrusion Detection Systems 00:05:01
- NIDS and NIPS 00:06:54
- Unified Threat Management 00:04:20
- Access Control
- Access Control Basics 00:06:14
- Authentication and Authorization 00:04:55
- Users, Groups, and Permissions 00:06:10
- Authentication Services 00:06:51
- Usernames and Passwords 00:05:38
- Permissions Inheritance 00:05:59
- File and Folder Permissions 00:05:55
- Remote Authentication 00:05:02
- Securing Applications
- Application Security Basics 00:06:56
- Application Attacks 00:06:06
- Securing the Browser 00:06:59
- Preventing Application Attacks 00:04:37
- Monitoring and Auditing
- Monitoring Basics 00:05:19
- Monitoring Tools 00:05:54
- Network Monitor 00:05:52
- Auditing Basics 00:06:07
- OS Hardening
- What is System Hardening? 00:05:48
- Network Device Hardening 00:04:51
- Understanding Virtualization 00:06:00
- Virtual Machine Security 00:05:59
- Encryption
- Cryptography and Encryption 00:06:17
- Symmetric vs. Asymmetric 00:06:24
- Understanding Hashing pt. 1 00:06:06
- Understanding Hashing pt. 2 00:02:18
- Public Key Infrastructure pt. 1 00:06:01
- Public Key Infrastructure pt. 2 00:05:14
- Disaster Recovery
- Disaster Recovery Basics 00:05:21
- Redundancy Basics 00:04:52
- High Availability 00:06:13
- Redundancy Planning 00:05:08
- Fault Tolerance 00:04:19
- RAID Levels pt. 1 00:04:22
- RAID Levels pt. 2 00:05:19
- Risk Assessment and Vulnerability
- Dealing with Security Risks pt. 1 00:06:19
- Dealing with Security Risks pt. 2 00:03:46
- Risk Analysis Options 00:03:21
- Risk Mitigation 00:06:29
- Data Loss Preventions 00:03:39
- Third Party Risks 00:06:48
- The Three P's
- Policies, Procedures & People 00:04:38
- Data Classification 00:05:54
- Social Engineering pt. 1 00:06:10
- Social Engineering pt. 2 00:04:57
- Environmental Threats 00:06:06
- User Education 00:03:34
- Incident Response Procedures 00:06:16
- Course Wrap-Up
- About the Author
- About the Author 00:03:42
TO MAC USERS: If RAR password doesn't work, use this archive program:
RAR Expander 0.8.5 Beta 4 and extract password protected files without error.
TO WIN USERS: If RAR password doesn't work, use this archive program:
Latest Winrar and extract password protected files without error.