Oreilly - CompTIA Security+ SY0-401 (2014 Objectives)
by Mark Long | Publisher: Infinite Skills | Release Date: September 2014 | ISBN: 9781771372831
In this CompTIA Security+ training course, expert author Mark Long will teach you everything you need to know to prepare for a career in IT security, and successfully complete the CompTIA Security+ certification.You will start by learning to understand the risks, such as risk assessment, calculation, and management, and then move on to learning about network devices. Mark will teach you about network design elements and wireless networks. This video tutorial also covers security threats, including viruses, antivirus software, and application attacks. You will also cover topics such as application security, data security, security in the cloud, and social engineering and physical security. Finally, you will learn the basics of monitoring networks, cryptography basics, security administration, and disaster recovery.Once you have completed this computer based training course, you will have developed the knowledge necessary to successfully earn your CompTIA Security+ certification. Working files are included, allowing you to follow along with the author throughout the lessons.
- Introduction
- What To Expect From This Course.mp4 00:01:12
- About The Author.mp4 00:03:51
- Course Overview.mp4 00:05:23
- About The Security+ Exams.mp4 00:05:42
- How To Access Your Working Files.mp4 00:01:15
- Understanding The Risks
- Risk Assessment.mp4 00:06:22
- Risk Calculation.mp4 00:05:07
- Policies Standards And Guidelines.mp4 00:06:19
- Understanding Control Types.mp4 00:03:47
- Risk Management.mp4 00:06:42
- Three A Concept
- Understanding The Three A Concept.mp4 00:04:20
- Authentication.mp4 00:06:25
- Access Control.mp4 00:06:05
- Access Control Methods.mp4 00:05:39
- Authentication Issues.mp4 00:05:39
- Authentication Protocols.mp4 00:05:03
- Authentication Services - Part 1.mp4 00:04:26
- Authentication Services - Part 2.mp4 00:05:55
- Best Practices.mp4 00:05:51
- Trusted OS.mp4 00:04:06
- Setting Permissions.mp4 00:03:06
- Network Devices
- Understanding TCP/IP.mp4 00:06:23
- Protocols And Services - Part 1.mp4 00:06:01
- Protocols And Services - Part 2.mp4 00:04:19
- Firewalls - Part 1.mp4 00:05:36
- Firewalls - Part 2.mp4 00:05:36
- Routers And Switches.mp4 00:03:52
- Load Balancing.mp4 00:06:19
- Proxy Servers.mp4 00:05:20
- IDS Versus IPS.mp4 00:06:35
- UTM Devices.mp4 00:06:15
- Protocol Analyzers.mp4 00:05:07
- Using A Network Monitor.mp4 00:03:46
- Network Design Elements
- Layering For Security.mp4 00:04:59
- DMZ.mp4 00:06:04
- VLANs.mp4 00:05:36
- NAT.mp4 00:06:05
- Security Threats
- Understanding Malware.mp4 00:06:15
- Viruses.mp4 00:06:03
- Virus Types - Part 1.mp4 00:05:36
- Virus Types - Part 2.mp4 00:04:21
- Antivirus Software.mp4 00:04:12
- Attack Types - Part 1.mp4 00:05:59
- Attack Types - Part 2.mp4 00:06:30
- Common Attacks.mp4 00:06:29
- Application Attacks - Part 1.mp4 00:05:48
- Application Attacks - Part 2.mp4 00:05:55
- Wireless Networks
- Wireless Network Basics.mp4 00:02:45
- Wireless Protocols.mp4 00:05:16
- Encryption Options.mp4 00:04:45
- WAP Basics.mp4 00:03:56
- Extensible Authentication Protocol.mp4 00:04:43
- Wireless Vulnerabilities.mp4 00:04:21
- Application Security
- Application Hardening.mp4 00:04:44
- Databases.mp4 00:06:03
- Patches And Updates.mp4 00:06:01
- Secure Coding.mp4 00:04:27
- Host Security
- Host Security Basics.mp4 00:04:53
- ACLs And Permissions.mp4 00:06:12
- Software Baselining.mp4 00:04:14
- Email And Web Server Security.mp4 00:05:59
- DHCP Security.mp4 00:04:46
- DNS Security.mp4 00:05:33
- Authorizing A DHCP Server.mp4 00:03:37
- Data Security
- Fault Tolerance Basics.mp4 00:06:06
- RAID 00:06:41
- Clustering.mp4 00:06:17
- The Backup Plan - Part 1.mp4 00:06:12
- The Backup Plan - Part 2.mp4 00:05:47
- Security In The Cloud
- Understanding Cloud Computing.mp4 00:03:45
- Four Cloud Types.mp4 00:05:45
- Saas, PaaS And IaaS.mp4 00:05:17
- Security In The Cloud.mp4 00:06:09
- Social Engineering And Physical Security
- Understanding Social Engineering.mp4 00:06:18
- Social Engineering Types.mp4 00:06:00
- Dealing With Social Engineering.mp4 00:06:11
- Physical Security - Part 1.mp4 00:05:40
- Physical Security - Part 2.mp4 00:05:18
- Cryptography
- Cryptography Basics.mp4 00:06:21
- PKI Basics.mp4 00:06:12
- X.509.mp4 00:03:55
- Viewing Certificates.mp4 00:03:46
- CAs And RAs.mp4 00:06:26
- SSL And TLS.mp4 00:04:29
- Hard And Soft Encryption.mp4 00:05:07
- Encrypting Files.mp4 00:05:58
- Web Server Certificate Request.mp4 00:05:09
- Monitoring Networks
- Network Monitoring Basics.mp4 00:05:58
- Event Viewer.mp4 00:04:28
- Hardening Basics - Part 1.mp4 00:04:58
- Hardening Basics - Part 2.mp4 00:06:34
- Detection Versus Prevention.mp4 00:05:38
- Security Monitoring.mp4 00:06:16
- Security Administration
- Security Awareness.mp4 00:04:49
- Information Classification.mp4 00:04:31
- Information Access.mp4 00:03:31
- Security Regulation Compliance.mp4 00:05:43
- Third Party Security.mp4 00:03:52
- Mobile Devices.mp4 00:05:57
- BYOD.mp4 00:03:14
- Disaster Recovery
- Disaster Recovery Plans.mp4 00:05:12
- Incident Response Policies.mp4 00:06:26
- Working With Vendors.mp4 00:06:13
- Security Testing.mp4 00:04:43
- Conclusion