SY0-601: CompTIA Security+ 2021
Best Seller
201 Lectures
23h 58m
Prepare for your CompTIA examination with our training course. The SY0-601 course contains a complete batch of videos that will provide you with profound and thorough knowledge related to CompTIA certification exam. Pass the CompTIA SY0-601 test with flying colors.
$14.99$24.99
Curriculum For This Course
- 1. SY0-501 vs 1m
- 2. Exam Information 6m
- 3. Building a lab 8m
- 1. CIA Triade 5m
- 2. IAAA 5m
- 3. Basic security controls 2m
- 1. Phishing, Smishing, Vishing, Spear phishing, Whaling 11m
- 2. Dumpster diving and Shoulder surfing 5m
- 3. Eliciting information and the principles of social engineering 9m
- 4. Pharming 7m
- 5. Spam 4m
- 6. Tailgating 3m
- 7. Other types Social Engineer techniques 15m
- 1. Introduction to Malware 2m
- 2. Ransomeware and Cryptomalware 7m
- 3. Trojans and RAT's 6m
- 4. Bot and Command and control 4m
- 5. Fileless Virus, Logic bombs, spyware, rootkit, backdoor 5m
- 6. Adversarial artificial intelligence (AI) 6m
- 7. Malicious USB cables, drives and Card Cloning 4m
- 8. Supply chain attacks 4m
- 9. Keyloggers 16m
- 10. How passwords are stored 5m
- 11. Using hashcat to crack passwords 7m
- 12. Using a brute force and rainbow tables to attack passwords 11m
- 1. Privilege escalation, (SSL) stripping, Pass the hash 11m
- 2. Cross-site scripting (XSS) and Injections 16m
- 3. Pointer Dereference, directory traversal, buffer overflows, and tocttou 12m
- 4. Replay attacks 4m
- 5. Request forgeries 9m
- 6. API Attacks 7m
- 7. Driver manipulation 5m
- 8. Integer overflow, Resource exhaustion, Memory leak 6m
- 1. Evil Twin and Rouge Access Point 6m
- 2. Bluesnarfing and Bluejacking 3m
- 3. Cracking WEP 10m
- 4. Disassociation and Jamming 7m
- 5. Man in the Middle, browser, and APR Poisoning 19m
- 6. IV, RFID, NFC Attacks 6m
- 7. MAC Flooding and Cloning 6m
- 8. DDOS Attacks 8m
- 9. Malicious Code 4m
- 1. Actors and threats 13m
- 2. Threat intelligence sources 17m
- 3. Research sources 11m
- 1. Cloud-based vs 10m
- 2. Weak configurations 9m
- 3. Third-party risks, Improper or weak patch, legacy platforms 10m
- 4. Impacts 6m
- 1. Threat hunting 4m
- 2. Vulnerability scans 18m
- 3. SIEM and SOAR 13m
- 1. Penetration testing 14m
- 2. Passive and active reconnaissance 4m
- 3. Exercise types 4m
- 1. Configuration management 12m
- 2. Data Sovereignty and Protection 12m
- 3. Other Security Consideration 13m
- 4. Site Resiliency, Hot, Warm, Cold 6m
- 5. Deception and disruption 6m
- 1. IaaS 11m
- 2. PaaS 5m
- 3. SaaS, XaaS 5m
- 4. Cloud Deployment 2m
- 5. Cloud Application terms 21m
- 6. IaC 13m
- 7. Virtualization Issues 5m
- 1. Software Development Environment 3m
- 2. Secure Coding Techniques 19m
- 3. DevOps and Automation 9m
- 1. Authentication methods 11m
- 2. Biometrics 9m
- 3. MFA 5m
- 4. Authentication, authorization, and accounting 3m
- 1. Redundancy 9m
- 2. Replication and storages 9m
- 3. Backup Types 14m
- 4. Non-persistence, high availability, diversity 6m
- 5. RAID 16m
- 1. Embedded Systems 4m
- 2. Industrial control system 4m
- 3. IoT 4m
- 4. IoT Communication and considerations 7m
- 1. Physical Security Controls 9m
- 2. Other physical security controls 7m
- 3. Locks and Fencings 7m
- 4. Fire Suppression 3m
- 5. Secure data destruction 6m
- 1. Introduction to cryptography 4m
- 2. Goals of cryptography 6m
- 3. Algorithm and Keys 20m
- 4. Block and stream ciphers 4m
- 5. Symmetric Ciphers 9m
- 6. Asymmetric Ciphers 10m
- 7. Hashing 13m
- 8. Hybrid cryptography 9m
- 9. Digital signatures 6m
- 10. Block Chain 7m
- 11. Steganography 8m
- 12. Key stretching 2m
- 13. Salting 6m
- 14. Quantum 3m
- 15. Ephemeral, PFS, Homomorphic 3m
- 16. Cipher Modes 5m
- 17. Lightweight cryptography 3m
- 18. Elliptic-curve cryptography 3m
- 19. Cipher suites 2m
- 20. Common use cases 3m
- 21. Limitations of encryptions 4m
- 1. DNSSEC 4m
- 2. Email security with S/MIME and PMP 5m
- 3. Installing Wireshark on Windows 10 8m
- 4. Install and setup an FTP Server and Client 10m
- 5. Using Wireshark to capture an FTP Password and securing FTP Server 9m
- 6. Lightweight Directory Access Protocol Over SSL 5m
- 7. SRPT, FTPS, SFTP, SNMP, IMAP 6m
- 8. SSH 5m
- 9. VPN and IPSEC 21m
- 10. Use Cases for secure protocols 5m
- 1. Endpoint Protection 5m
- 2. Boot integrity 3m
- 3. Databases 2m
- 4. Application Security 10m
- 5. Hardening systems 6m
- 6. Drive Encryption and sandboxing 9m
- 1. Load Balancing 7m
- 2. Network segmentation 7m
- 3. How to download and install packet tracer 9m
- 4. VLAN's and Port Security 18m
- 5. Firewalls 13m
- 6. Configuring firewall rules 11m
- 7. Jump and Proxy servers 4m
- 8. IDS and IPS 9m
- 9. Other network secure concepts 8m
- 1. Wireless Security 17m
- 2. Wireless Installation Considerations 5m
- 1. Mobile Connection methods and receivers 3m
- 2. Mobile device management (MDM) 5m
- 3. UEM and MAM 4m
- 4. Enforcement and monitoring of mobile devices 7m
- 5. Mobile Deployment Models 4m
- 1. Cloud Solutions controls 3m
- 2. Cloud Network and computing 5m
- 3. Cloud Security terms 7m
- 1. Identity and account types 5m
- 2. Account policies 12m
- 1. Authentication management 4m
- 2. Authentication Protocols 19m
- 3. Access control schemes 14m
- 1. Introduction to PKI 5m
- 2. Process of getting a certificate 7m
- 3. PKI Setup 16m
- 4. Fields on a certificate 7m
- 5. Certificate formats 2m
- 6. Certificate types 6m
- 1. Introductions to commands 2m
- 2. ARP and Route 3m
- 3. hping 6m
- 4. Curl 4m
- 5. IP scanner 3m
- 6. ipconfig, ping, tracert 4m
- 7. Linux file manipulation, head, tail, cat 5m
- 8. Log 3m
- 9. Cuckoo 1m
- 10. thehavester 2m
- 11. Nslookup and Dig 2m
- 12. tcpdump 4m
- 13. NetCat 2m
- 14. Sniper 5m
- 15. scanless 2m
- 16. nmap 4m
- 17. Managing Linux Permissions 16m
- 18. Shell and script environments 2m
- 19. Exploitation frameworks 4m
- 20. Forensics tools 7m
- 1. Incident response process 8m
- 2. Attack Frameworks 5m
- 3. Incidents plans and exercises 6m
- 1. Log Files 7m
- 2. Capture log files 7m
- 1. Incident mitigation techniques 8m
- 1. Documentation and evidence 6m
- 1. Control Types and category 6m
- 1. Regulations, standards, and legislation 5m
- 2. Key frameworks 15m
- 3. Secure configuration guides 2m
- 1. Personnel Controls 15m
- 2. Third-party risk management 6m
- 3. Credential and organizations policies 7m
- 1. Risk types, terms, and Process 12m
- 2. Risk management strategies 6m
- 3. Risk Assessments 9m
- 4. Business impact analysis 8m
- 1. Privacy breaches 4m
- 2. Data types 6m
- 3. Privacy technologies and roles 7m
- 1. Performance Based Questions Introduction 1m
- 2. PBQ - Attack Types and Response 2m
- 3. PBQ - Incident Response 2m
- 4. PBQ - Social Engineering 2m
- 5. PBQ - Firewalls 4m
Hot Exams
How to Open Test Engine .dumpsqueen Files
Use FREE DumpsQueen Test Engine player to open .dumpsqueen files
Your purchase with DumpsQueen.com is safe and fast.
The DumpsQueen.com website is protected by 256-bit SSL from Cloudflare, the leader in online security.