CompTIA Security+ (SYO-501) Complete Course
This is a subtitle. Get more detailed about your course here!
**You can pass the CompTIA Security+ (SY0-501) Exam **
Taught by an expert in information technology and cyber security with over 20 years of experience, this course is a fun way to master the fundamentals of computer security.
My name is Jason Dion, and I have personally helped over 60,000 students earn their IT certifications, and now I can help you, too!
This course is designed to help prepare you for the CompTIA Security+ (SY0-501) certification examand covers the six domains for the Security+ (SY0-501) certification exam:
Threats, Attacks, and Vulnerabilities
Technologies and Tools
Architecture and Design
Identity and Access Management
Risk Management
Cryptography and PKI
You will learn the fundamentals of cyber security and gain experience in the configuration, management, and troubleshooting of common wired and wireless networks.
What You Will Receive In The Course:
Video lectures with the essential information needed to pass the Security+ exam
Downloadable copies of our Study Notes based on the lessons
Practice questions to ensure mastery of each section of the course
A full-length practice exam with multiple choice and mock simulations
Welcome
Overview of Security
CIA Triad
AAA of Security
Security Threats
Mitigating Threats
Hackers
Malware
Viruses
Worms
Trojans
Demo Viruses and Trojans
Ransomware
Spyware
Rootkits
Spam
Summary of Malware
Malware Infections
Common Delivery Methods
Demo Phishing
Botnets and Zombies
Active Interception and Privilege Escalation
Demo Privilege Escalation
Backdoors and Logic Bombs
Symptoms of Infection
Removing Malware
Preventing Malware
Security Applications and Devices
Software Firewalls
Demo Software Firewalls
IDS
Pop-up Blockers
Data Loss Prevention (DLP)
Securing the BIOS
Securing Storage Devices
Disk Encryption
Mobile Device Security
Securing Wireless Devices
Mobile Malware
SIM Cloning & ID Theft
Bluetooth Attacks
Mobile Device Theft
Security of Apps
BYOD
Hardening Mobile Devices
Hardening
Unnecessary Applications
Restricting Applications
Demo Unnecessary Services
Trusted Operating System
Updates and Patches
Patch Management
Group Policies
Demo Group Policies
File Systems and Hard Drives
Virtualization
Hypervisors
How to create a VM
Threats to VMs
Securing VMs
Securing VMs (Demo)
Application Security
Web Browser Security
Web Browser Concerns
Demo Web Browser Configuration
Securing Applications
Software Development
SDLC Principles
Testing Methods
Software Vulnerabilities and Exploits
Buffer Overflows
Demo Buffer Overflow Attack
XSS and XSRF
SQL Injection
Demo SQL Injection
Network Security
OSI Model
Switches
Routers
Network Zones
Network Access Control (NAC)
VLANs
Subnetting
Network Address Translation
Telephony Devices
Perimeter Security
Firewalls
Demo SOHO Firewall
Proxy Servers
Honeypots and Honeynets
Data Loss Prevention
NIDS vs NIPS
Unified Threat Management
Cloud Computing
Cloud Types
As a Service
Cloud Security
Defending Servers
Network Attacks
Ports and Protocols
Memorization of Ports
Unnecessary Ports
Denial of Service
DDoS
Stopping a DDoS
Spoofing
Hijacking
Replay Attack
Demo Null Sessions
Transitive Attacks
DNS Attacks
ARP Poisoning
Securing Networks
Securing Network Devices
Securing Network Media
Securing WiFi Devices
Wireless Encryption
Wireless Access Points
Wireless Attacks
Demo Wireless Attack
Other Wireless Technologies
Physical Security
Surveillance
Door Locks
Demo Lock Picking
Biometric Readers
Facilities Security
Fire Suppression
HVAC
Shielding
Vehicles
Authentication
Authenication Models
802.1x
LDAP and Kerberos
Remote Desktop Services
Remote Access Services
VPN
RADIUS and TACACS+
Authentication Summary
Access Control
Access Control Models
Best Practices
Users and Groups
Permissions
Usernames and Password
Demo Policies
User Account Control
Risk Assessments
Qualitative Risk
Quantitative Risk
Methodologies
Security Controls
Vulnerability Management
Penetration Testing
OVAL
Vulnerability Assessment
Nmap Scanning
Demo Vulnerability Scanning
Password Analysis
Demo Password Cracking
Monitoring Types
Performance Baselining
Protocol Analyzers
SNMP
Demo Analytical Tools
Auditing
Auditing Files (Demo)
Logging
Log Files
SIEM
Cryptography
Symmetric vs Asymmetric
Symmetric Algorithms
Public Key Cryptography
Asymmetric Algorithms
Pretty Good Privacy
Key Management
One-Time Pad
Steganography (Demo)
Hashing
Demo Hashing
Hashing Attacks
Increasing Hash Security
Public Key Infrastructure
Digital Certificates
Certificates (Demo)
Certificate Authorities
Web of Trust
Security Protocols
SMIME
SSL and TLS
SSH
VPN Protocols
Demo Setting Up a VPN
Planning for the Worst
Redundant Power
Backup Power
Data Redundancy
Demo RAIDs
Network Redundancy
Server Redundancy
Redundant Sites
Data Backup
Tape Rotation
Disaster Recovery Plan
Social Engineering
Demo Pretexting
Insider Threat
Phishing
More Social Engineering
User Education
Policies and Procedures
Data Classifications
PII and PHI
Security Policies
User Education
Vendor Relationships
Disposal Policies
Incident Response Procedures
Data Collection Procedures
Demo Disk Imaging
IT Security Frameworks
Conclusion
Exam Tricks
Practice Exam
Eric Chu