->
Oreilly - CompTIA Security+ Certification (Exam SY0-401) - 9781618660329
Oreilly - CompTIA Security+ Certification (Exam SY0-401)
by VTC | Publisher: Virtual Training Company, Inc. | Release Date: March 2017 | ISBN: 9781618660329


Network and computer security used to be a high proiority, now security has become an absolute necessity. Understanding the fundamentals of network and computer security is a must in today's environment. CompTIA's Security+ certification is recognized around the world as validation that you know about the fundamental network and computer security practices and actions as well as the technologies involved. Earning the Security+ certification will open doors in the Information Technology workplace. In this course, Mark Long goes step-by-step to help you understand the various technologies and techniques to help you prepare for the CompTIA Security+ SY0-401 exam. Mark has been working in Information Technology for over 25 years and has worked in data security in the corporate environment and brings real-world knowledge to help you get ready for this exam.
  1. Welcome/intro
    • Welcome/intro 00:01:27
    • Course Overview 00:04:12
    • Why Security+ 00:06:18
  2. About the Exam
    • What to Expect on the Exam 00:03:27
    • How to Prepare 00:06:16
    • How to Take the Exam 00:05:31
  3. Computer Security Basics
    • Security Basics 00:05:15
    • Security Threats 00:05:17
    • Securing Computer Hardware 00:06:14
    • Securing Storage Devices 00:06:44
    • Security Removable Media 00:05:04
    • Securing Storage Devices Demo 00:03:08
    • Malicious Software pt. 1 00:06:16
    • Malicious Software pt. 2 00:05:27
    • Preventing Malicious Software 00:04:59
    • Understanding Physical Security 00:06:47
    • Hardware Disposal 00:03:46
  4. Network Design
    • Network Security Basics 00:06:49
    • Understanding Firewalls 00:03:38
    • Firewall Operations 00:05:38
    • Network Address Translation 00:06:06
    • Switches 00:05:19
    • Routers 00:05:44
    • Network Security Devices 00:06:41
    • Understanding VLANs 00:05:15
    • Cloud Computing Basics 00:05:55
    • Cloud Computing Types 00:06:26
    • Security in the Cloud 00:06:12
    • Securing Servers 00:06:18
  5. Network Protocols and Threats
    • Network Protocol Basics 00:06:51
    • Understanding Ports 00:05:20
    • Common Ports 00:04:50
    • Network Attacks pt. 1 00:06:26
    • Network Attacks pt. 2 00:06:54
    • Honeypots and Honeynets 00:06:10
    • Intrusion Detection Systems 00:05:01
    • NIDS and NIPS 00:06:54
    • Unified Threat Management 00:04:20
  6. Access Control
    • Access Control Basics 00:06:14
    • Authentication and Authorization 00:04:55
    • Users, Groups, and Permissions 00:06:10
    • Authentication Services 00:06:51
    • Usernames and Passwords 00:05:38
    • Permissions Inheritance 00:05:59
    • File and Folder Permissions 00:05:55
    • Remote Authentication 00:05:02
  7. Securing Applications
    • Application Security Basics 00:06:56
    • Application Attacks 00:06:06
    • Securing the Browser 00:06:59
    • Preventing Application Attacks 00:04:37
  8. Monitoring and Auditing
    • Monitoring Basics 00:05:19
    • Monitoring Tools 00:05:54
    • Network Monitor 00:05:52
    • Auditing Basics 00:06:07
  9. OS Hardening
    • What is System Hardening? 00:05:48
    • Network Device Hardening 00:04:51
    • Understanding Virtualization 00:06:00
    • Virtual Machine Security 00:05:59
  10. Encryption
    • Cryptography and Encryption 00:06:17
    • Symmetric vs. Asymmetric 00:06:24
    • Understanding Hashing pt. 1 00:06:06
    • Understanding Hashing pt. 2 00:02:18
    • Public Key Infrastructure pt. 1 00:06:01
    • Public Key Infrastructure pt. 2 00:05:14
  11. Disaster Recovery
    • Disaster Recovery Basics 00:05:21
    • Redundancy Basics 00:04:52
    • High Availability 00:06:13
    • Redundancy Planning 00:05:08
    • Fault Tolerance 00:04:19
    • RAID Levels pt. 1 00:04:22
    • RAID Levels pt. 2 00:05:19
  12. Risk Assessment and Vulnerability
    • Dealing with Security Risks pt. 1 00:06:19
    • Dealing with Security Risks pt. 2 00:03:46
    • Risk Analysis Options 00:03:21
    • Risk Mitigation 00:06:29
    • Data Loss Preventions 00:03:39
    • Third Party Risks 00:06:48
  13. The Three P's
    • Policies, Procedures & People 00:04:38
    • Data Classification 00:05:54
    • Social Engineering pt. 1 00:06:10
    • Social Engineering pt. 2 00:04:57
    • Environmental Threats 00:06:06
    • User Education 00:03:34
    • Incident Response Procedures 00:06:16
  14. Course Wrap-Up
    • Course Wrap-Up 00:04:22
  15. About the Author
    • About the Author 00:03:42
  16. Oreilly - CompTIA Security+ Certification (Exam SY0-401)


 TO MAC USERS: If RAR password doesn't work, use this archive program: 

RAR Expander 0.8.5 Beta 4  and extract password protected files without error.


 TO WIN USERS: If RAR password doesn't work, use this archive program: 

Latest Winrar  and extract password protected files without error.


 Coktum   |  

Information
Members of Guests cannot leave comments.




rss