SY0-501: CompTIA Security+
Best Seller
222 Lectures
14h 34m 26s
Prepare for your CompTIA examination with our training course. The SY0-501 course contains a complete batch of videos that will provide you with profound and thorough knowledge related to CompTIA certification exam. Pass the CompTIA SY0-501 test with flying colors.
$14.99$24.99
Curriculum For This Course
- 1. Overview of Security 2m 55s
- 2. CIA Triad 3m 54s
- 3. AAA of Security 3m 5s
- 4. Security Threats 2m 57s
- 5. Mitigating Threats 2m 28s
- 6. Hackers 4m 53s
- 7. Threat Actors 3m 12s
- 1. Malware 39s
- 2. Viruses 6m 21s
- 3. Worms 2m 9s
- 4. Trojans 2m 48s
- 5. Demo: Viruses and Trojans 6m 16s
- 6. Ransomware 2m 30s
- 7. Spyware 2m 39s
- 8. Rootkits 3m 29s
- 9. Spam 2m 56s
- 10. Summary of Malware 2m 2s
- 1. Malware Infections 4m 12s
- 2. Common Delivery Methods 3m 23s
- 3. Botnets and Zombies 3m 30s
- 4. Active Interception and Privilege Escalation 2m 28s
- 5. Demo: Privilege Escalation 5m 41s
- 6. Backdoors and Logic Bombs 3m 48s
- 7. Symptoms of Infection 4m 10s
- 8. Removing Malware 5m 1s
- 9. Preventing Malware 5m 56s
- 1. Security Applications and Devices 33s
- 2. Software Firewalls 4m 16s
- 3. Demo: Software Firewalls 6m 44s
- 4. IDS 5m 3s
- 5. Pop-up Blockers 3m 9s
- 6. Data Loss Prevention (DLP) 3m 43s
- 7. Securing the BIOS 3m 56s
- 8. Securing Storage Devices 3m 26s
- 9. Disk Encryption 4m 51s
- 1. Mobile Device Security 1m 14s
- 2. Securing Wireless Devices 1m 30s
- 3. Mobile Malware 6m 19s
- 4. SIM Cloning & ID Theft 4m
- 5. Bluetooth Attacks 2m 8s
- 6. Mobile Device Theft 3m 10s
- 7. Security of Apps 5m 6s
- 8. BYOD 4m 56s
- 9. Hardening Mobile Devices 3m 51s
- 1. Hardening 1m 47s
- 2. Unnecessary Applications 3m 10s
- 3. Restricting Applications 2m 56s
- 4. Demo: Unnecessary Services 5m 35s
- 5. Trusted Operating System 1m 57s
- 6. Updates and Patches 3m 26s
- 7. Patch Management 3m 49s
- 8. Group Policies 2m 33s
- 9. Demo: Group Policies 4m 6s
- 10. File Systems and Hard Drives 3m 18s
- 1. Virtualization 2m 7s
- 2. Hypervisors 2m 37s
- 3. Demo: How to create a VM 4m 39s
- 4. Threats to VMs 3m 43s
- 5. Securing VMs 3m 47s
- 6. Demo: Securing VMs 4m 41s
- 1. Application Security 1m 43s
- 2. Web Browser Security 6m 39s
- 3. Web Browser Concerns 3m 19s
- 4. Demo: Web Browser Configuration 5m 20s
- 5. Securing Applications 4m 49s
- 1. Software Development 8m 34s
- 2. SDLC Principles 6m 22s
- 3. Testing Methods 6m 59s
- 4. Software Vulnerabilities and Exploits 2m 28s
- 5. Buffer Overflows 6m 15s
- 6. Demo: Buffer Overflow Attack 6m 25s
- 7. XSS and XSRF 3m 7s
- 8. SQL Injection 6m 25s
- 9. Demo: SQL Injection 7m 13s
- 1. Network Security 44s
- 2. The OSI Model 6m
- 3. Switches 3m 32s
- 4. Routers 2m 27s
- 5. Network Zones 3m 26s
- 6. Network Access Control 2m 40s
- 7. VLANs 1m 30s
- 8. Subnetting 1m 51s
- 9. Network Address Translation 2m 26s
- 10. Telephony 5m 58s
- 1. Perimeter Security 46s
- 2. Firewalls 8m 1s
- 3. Demo: SOHO Firewall 4m 4s
- 4. Proxy Servers 4m 12s
- 5. Honeypots and Honeynets 1m 22s
- 6. Data Loss Prevention 1m 35s
- 7. NIDS and NIPS 4m 11s
- 8. Unified Threat Management 1m 52s
- 1. Cloud Computing 3m 29s
- 2. Cloud Types 2m 51s
- 3. As a Service 7m 4s
- 4. Cloud Security 2m 25s
- 5. Defending Servers 4m 32s
- 1. Network Attacks 38s
- 2. Ports and Protocols 54s
- 3. Memorization of Ports 11m 30s
- 4. Unnecessary Ports 3m 21s
- 5. Denial of Service 7m 56s
- 6. DDoS 1m 36s
- 7. Stopping a DDoS 2m 27s
- 8. Spoofing 1m 16s
- 9. Hijacking 3m 45s
- 10. Replay Attack 1m 27s
- 11. Demo: Null Sessions 2m 24s
- 12. Transitive Attacks 1m 24s
- 13. DNS Attacks 4m 33s
- 14. ARP Poisoning 1m 30s
- 1. Securing Networks 49s
- 2. Securing Network Devices 6m 43s
- 3. Securing Network Media 8m 48s
- 4. Securing WiFi Devices 4m 22s
- 5. Wireless Encryption 5m 30s
- 6. Wireless Access Points 6m 11s
- 7. Wireless Attacks 4m 15s
- 8. Demo: Wireless Attack 6m 58s
- 9. Other Wireless Technologies 6m 2s
- 1. Physical Security 1m 30s
- 2. Surveillance 2m 51s
- 3. Door Locks 3m 47s
- 4. Demo: Lock Picking 1m 36s
- 5. Biometric Readers 4m 15s
- 1. Facilities Security 36s
- 2. Fire Suppression 6m 21s
- 3. HVAC 2m 23s
- 4. Shielding 2m 34s
- 5. Vehicles 2m 3s
- 1. Authentication 5m 53s
- 2. Authentication Models 5m 17s
- 3. 802.1x 3m 44s
- 4. LDAP and Kerberos 2m 26s
- 5. Remote Desktop Services 1m 51s
- 6. Remote Access Service 2m 3s
- 7. VPN 3m 2s
- 8. RADIUS vs TACACS+ 2m 18s
- 9. Authentication Summary 2m 4s
- 1. Access Control 50s
- 2. Access Control Models 8m 14s
- 3. Best Practices 5m 44s
- 4. Users and Groups 9m 12s
- 5. Permissions 3m 41s
- 6. Usernames and Passwords 2m 36s
- 7. Demo: Policies 4m 34s
- 8. User Account Control 1m 53s
- 1. Risk Assessments 8m 33s
- 2. Qualitative Risk 4m 6s
- 3. Quantitative Risk 5m 27s
- 4. Methodologies 2m 49s
- 5. Security Controls 6m 49s
- 6. Vulnerability Management 7m 50s
- 7. Penetration Testing 4m 26s
- 8. OVAL 1m 34s
- 9. Vulnerability Assessments 6m 52s
- 10. Demo: Nmap Scanning 8m 50s
- 11. Demo: Vulnerability Scanning 9m 33s
- 12. Password Analysis 5m 54s
- 13. Demo: Password Cracking 2m 36s
- 1. Monitoring Types 2m 54s
- 2. Performance Baselining 4m 35s
- 3. Protocol Analyzers 2m 58s
- 4. SNMP 3m 40s
- 5. Demo: Analytical Tools 4m 27s
- 6. Auditing 1m 54s
- 7. Demo: Auditing Files 3m 53s
- 8. Logging 3m 39s
- 9. Log Files 5m 14s
- 10. SIEM 2m 54s
- 1. Cryptography 4m 56s
- 2. Symmetric vs Asymmetric 6m 12s
- 3. Symmetric Algorithms 4m 56s
- 4. Public Key Cryptography 3m 9s
- 5. Asymmetric Algorithms 3m 44s
- 6. Pretty Good Privacy 1m 46s
- 7. Key Management 2m 11s
- 8. One-Time Pad 4m 18s
- 9. Hashing 8m 27s
- 10. Demo: Hashing 3m 4s
- 11. Hashing Attacks 3m 15s
- 12. Increasing Hash Security 1m 26s
- 1. Public Key Infrastructure 3m 53s
- 2. Digital Certificates 6m 42s
- 3. Demo: Certificates 3m 31s
- 4. Certificate Authorities 4m 12s
- 5. Web of Trust 2m 35s
- 1. Security Protocols 21s
- 2. S/MIME 1m 29s
- 3. SSL and TLS 5m 48s
- 4. SSH 2m 28s
- 5. VPN Protocols 6m 37s
- 6. Demo: Setting up a VPN 1m 37s
- 1. Planning for the Worst 2m 9s
- 2. Redundant Power 3m 8s
- 3. Backup Power 3m 6s
- 4. Data Redundancy 4m 39s
- 5. Demo: RAIDs 3m 35s
- 6. Network Redundancy 2m 4s
- 7. Server Redundancy 1m 42s
- 8. Redundant Sites 2m 20s
- 9. Data Backup 2m 54s
- 10. Tape Rotation 3m 52s
- 11. Disaster Recovery Plan 5m 38s
- 1. Social Engineering 52s
- 2. Demo: Pretexting 4m 14s
- 3. Insider Threat 2m 10s
- 4. Phishing 1m 13s
- 5. More Social Engineering 4m
- 6. User Education 4m 44s
- 1. Policies and Procedures 5m 53s
- 2. Data Classifications 6m 42s
- 3. PII and PHI 6m 19s
- 4. Security Policies 10m 19s
- 5. User Education 4m 2s
- 6. Vendor Relationships 7m 52s
- 7. Disposal Policies 5m 4s
- 8. Incident Response Procedures 4m 36s
- 9. Data Collection Procedures 3m 11s
- 10. Demo: Disk Imaging 6m 56s
- 11. IT Security Frameworks 3m 18s
- 1. Exam Tricks 4m 9s
Hot Exams
How to Open Test Engine .dumpsqueen Files
Use FREE DumpsQueen Test Engine player to open .dumpsqueen files
Your purchase with DumpsQueen.com is safe and fast.
The DumpsQueen.com website is protected by 256-bit SSL from Cloudflare, the leader in online security.