CompTIA Security+ (SY0-701) Complete Course & Exam

CompTIA Security+ (SY0-701) Complete Course & Exam

English | MP4 | AVC 1280×720 | AAC 44KHz 2ch | 263 lectures (30h 56m) | 16.63 GB

CompTIA Security+ (SY0-701) Bootcamp – Your preparation for the world’s best cybersecurity certification!

Taught by a Best Selling IT Certification Instructor

Taught by an expert in information technology and cybersecurity with over 20 years of experience, this course is a fun way to master the fundamentals of computer security.

You will learn the fundamentals of cybersecurity and gain experience in the configuration, management, and troubleshooting of common wired and wireless networks with lessons, lectures, and video demonstrations to teach you everything you need to know to pass the CompTIA Security+ exam.

CompTIA Security+ (SY0-701) is the world’s most popular cybersecurity certification today!

This course is designed to help prepare you for the CompTIA Security (SY0-701) certification exam and covers all the domains the Security+ (SY0-701) certification exam:

CompTIA Security+ (SY0-701):

  • General Security Concepts
  • Threats, Vulnerabilities, and Mitigations
  • Security Architecture
  • Security Operations
  • Security Program Management and Oversight

What you’ll learn

  • Fundamental Security Concepts
  • Navigating Threats, Vulnerabilities, & Remedies
  • Decoding Security Architecture
  • Mastering Security Operations
  • Guiding Security Program Management & Oversight
Table of Contents

Introduction
1 Download the Study Guide
2 Exam Tips

Fundamentals of Security
3 Fundamentals of Security
4 Threats and Vulnerabilities
5 Confidentiality (OBJ 1.2)
6 Integrity (OBJ 1.2)
7 Availability (OBJ 1.2)
8 Non-repudiation (OBJ 1.2)
9 Authentication (OBJ 1.2)
10 Authorization (OBJ 1.2)
11 Accounting (OBJ 1.2)
12 Security Control Categories (OBJ 1.1)
13 Security Control Types (OBJ 1.1)
14 Gap Analysis (OBJ 1.1)
15 Zero Trust (OBJ 1.2)

Threat Actors
16 Threat Actors (OBJ 1.2, 2.1, & 2.2)
17 Threat Actor Motivations (OBJ 2.1)
18 Threat Actor Attributes (OBJ 2.1)
19 Unskilled Attackers (OBJ 2.1)
20 Hacktivists (OBJ 2.1)
21 Organized Crime (OBJ 2.1)
22 Nation-state Actor (OBJ 2.1)
23 Insider Threats (OBJ 2.1)
24 Shadow IT (OBJ 2.1)
25 Threat Vectors and Attack Surfaces (OBJ 2.2)
26 Outsmarting Threat Actors (OBJ 1.2)

Physical Security
27 Physical Security (OBJ 1.2 & 2.4)
28 Fencing and Bollards (OBJ 1.2)
29 Attacking with Brute Force (OBJ 2.4)
30 Surveillance Systems (OBJ 1.2)
31 Bypassing Surveillance Systems (OBJ 2.4)
32 Access Control Vestibules (OBJ 1.2)
33 Door Locks (OBJ 1.2)
34 Access Badge Cloning (OBJ 2.4)

Social Engineering
35 Social Engineering (OBJ 2.2 & 5.6)
36 Motivational Triggers (OBJ 5.6)
37 Impersonation (OBJ 2.2)
38 Pretexting (OBJ 2.2)
39 Phishing Attacks (OBJ 2.2)
40 Preventing Phishing Attacks (OBJ 5.6)
41 Conducting an Anti-Phishing Campaign (OBJ 5.6)
42 Frauds and Scams (OBJ 2.2)
43 Influence Campaigns (OBJ 2.2)
44 Other Social Engineering Attacks (OBJ 2.2)

Malware
45 Malware (OBJ 2.4)
46 Viruses (OBJ 2.4)
47 Worms (OBJ 2.4)
48 Trojans (OBJ 2.4)
49 Viruses and Trojans (OBJ 2.4)
50 Ransomware (OBJ 2.4)
51 Zombies and Botnets (OBJ 2.4)
52 Rootkits (OBJ 2.4)
53 Backdoors and Logic Bombs (OBJ 2.4)
54 Keylogger (OBJ 2.4)
55 Spyware and Bloatware (OBJ 2.4)
56 Malware Attack Techniques (OBJ 2.4)
57 Indications of Malware Attacks (OBJ 2.4)

Data Protection
58 Data Protection (OBJ 1.4, 3.3, 4.2, 4.4, & 5.1)
59 Data Classifications (OBJ 3.3)
60 Data Ownership (OBJ 4.2 & 5.1)
61 Data States (OBJ 3.3)
62 Data Types (OBJ 3.3 & 1.4)
63 Data Sovereignty (OBJ 3.3)
64 Securing Data (OBJ 3.3)
65 Data Loss Prevention (DLP) (OBJ 4.4)
66 Configuring a DLP (OBJ 4.5)

Cryptographic Solutions
67 Cryptographic Solutions (OBJ 1.4, 2.3, & 2.4)
68 Symmetric vs Asymmetric (OBJ 1.4)
69 Symmetric Algorithms (OBJ 1.4)
70 Asymmetric Algorithms (OBJ 1.4)
71 Hashing (OBJ 1.4)
72 Increasing Hash Security (OBJ 1.4)
73 Public Key Infrastructure (PKI) (OBJ 1.4)
74 Digital Certificates (OBJ 1.4)
75 Exploring Digital Certificates (OBJ 1.4)
76 Blockchain (OBJ 1.4)
77 Encryption Tools (OBJ 1.4)
78 Obfuscation (OBJ 1.4)
79 Cryptographic Attacks (OBJ 2.3 & 2.4)

Risk Management
80 Risk Management (OBJ 5.2)
81 Risk Assessment Frequency (OBJ 5.2)
82 Risk Identification (OBJ 5.2)
83 Risk Register (OBJ 5.2)
84 Qualitative Risk Analysis (OBJ 5.2)
85 Quantitative Risk Analysis (OBJ 5.2)
86 Risk Management Strategies (OBJ 5.2)
87 Risk Monitoring and Reporting (OBJ 5.2)

Third-party Vendor Risks
88 Third-party Vendor Risks (OBJ 2.2, 2.3, & 5.3)
89 Supply Chain Risks (OBJ 2.3 & 5.3)
90 Supply Chain Attacks (OBJ 2.2 & 5.3)
91 Vendor Assessment (OBJ 5.3)
92 Vendor Selection and Monitoring (OBJ 5.3)
93 Contracts and Agreements (OBJ 5.3)

Governance and Compliance
94 Governance and Compliance (OBJ 5.1 & 5.4)
95 Governance (OBJ 5.1)
96 Governance Structures (OBJ 5.1)
97 Policies (OBJ 5.1)
98 Standards (OBJ 5.1)
99 Procedures (OBJ 5.1)
100 Governance Considerations (OBJ 5.1)
101 Compliance (OBJ 5.4)
102 Non-compliance Consequences (OBJ 5.4)

Asset and Change Management
103 Asset and Change Management (OBJ 1.3, 4.1, & 4.2)
104 Acquisition and Procurement (OBJ 4.2)
105 Mobile Asset Deployments (OBJ 4.1)
106 Asset Management (OBJ 4.2)
107 Asset Disposal and Decommissioning (OBJ 4.2)
108 Change Management (OBJ 1.3)
109 Change Management Processes (OBJ 1.3)
110 Technical Implications of Changes (OBJ 1.3)
111 Documenting Changes (OBJ 1.3)

Audits and Assessments
112 Audits and Assessments (OBJ 5.5)
113 Internal Audits and Assessments (OBJ 5.5)
114 Performing an Internal Assessment (OBJ 5.5)
115 External Audits and Assessments (OBJ 5.5)
116 Performing an External Assessment (OBJ 5.5)
117 Penetration Testing (OBJ 5.5)
118 Reconnaissance in Pentesting (OBJ 5.5)
119 Performing a Basic PenTest (OBJ 5.5)
120 Attestation of Findings (OBJ 5.5)

Cyber Resilience and Redundancy
121 Cyber Resilience and Redundancy (OBJ 3.4)
122 High Availability (OBJ 3.4)
123 Data Redundancy (OBJ 3.4)
124 Configuring a RAID (OBJ 3.4)
125 Capacity Planning (OBJ 3.4)
126 Powering Data Centers (OBJ 3.4)
127 Data Backups (OBJ 3.4)
128 Continuity of Operations Plan (OBJ 3.4)
129 Redundant Site Considerations (OBJ 3.4)
130 Resilience and Recovery Testing (OBJ 3.4)

Security Architecture
131 Security Architecture (OBJ 3.1 & 4.1)
132 On-premise versus the Cloud (OBJ 3.1)
133 Cloud Security (OBJ 3.1 & 4.1)
134 Virtualization and Containerization (OBJ 2.3 & 3.1)
135 Serverless (OBJ 3.1)
136 Microservices (OBJ 3.1)
137 Network Infrastructure (OBJ 3.1)
138 Software-Defined Network (SDN) (OBJ 3.1)
139 Infrastructure as Code (IaC) (OBJ 3.1)
140 Centralized vs Decentralized Architectures (OBJ 3.1)
141 Internet of Things (IoT) (OBJ 3.1 & 4.1)
142 ICS and SCADA (OBJ 3.1 & 4.1)
143 Embedded Systems (OBJ 3.1 & 4.1)

Security Infrastructure
144 Security Infrastructure (OBJ 3.2 & 4.5)
145 Ports and Protocols (OBJ 4.5)
146 Firewalls (OBJ 3.2)
147 Configuring Firewalls (OBJ 4.5)
148 IDS and IPS (OBJ 3.2)
149 Network Appliances (OBJ 3.2)
150 Port Security (OBJ 3.2)
151 Securing Network Communications (OBJ 3.2)
152 SD-WAN and SASE (OBJ 3.2)
153 Infrastructure Considerations (OBJ 3.2)
154 Selecting Infrastructure Controls (OBJ 3.2)

Identity and Access Management (IAM) Solutions
155 Identity and Access Management (IAM) Solutions (OBJ 2.4 & 4.6)
156 Identity and Access Management (IAM) (OBJ 4.6)
157 Multifactor Authentication (OBJ 4.6)
158 Password Security (OBJ 4.6)
159 Password Attacks (OBJ 2.4)
160 Single Sign-On (SSO) (OBJ 4.6)
161 Federation (OBJ 4.6)
162 Privileged Access Management (PAM) (OBJ 4.6)
163 Access Control Models (OBJ 4.6)
164 Assigning Permissions (OBJ 4.6)

Vulnerabilities and Attacks
165 Vulnerabilities and Attacks (OBJ 2.2, 2.3, 2.4, 2.5, & 4.1)
166 Hardware Vulnerabilities (OBJ 2.2, 2.3, & 2.5)
167 Bluetooth Vulnerabilities and Attacks (OBJ 2.3, 2.5, & 4.1)
168 Mobile Vulnerabilities and Attacks (OBJ 2.3, 2.5, & 4.1)
169 Zero-day Vulnerabilities (OBJ 2.3)
170 Operating System Vulnerabilities (OBJ 2.3 & 2.5)
171 SQL and XML Injections (OBJ 2.3 & 2.4)
172 Conducting an SQL Injection (OBJ 2.3 & 2.4)
173 XSS and XSRF (OBJ 2.3 & 2.4)
174 Buffer Overflow (OBJ 2.3 & 2.4)
175 Race Conditions (OBJ 2.3)

Malicious Activity
176 Malicious Activity (OBJ 2.4)
177 Distributed Denial of Service (OBJ 2.4)
178 Domain Name System (DNS) Attacks (OBJ 2.4)
179 Directory Traversal Attack (OBJ 2.4)
180 Execution and Escalation Attack (OBJ 2.4)
181 Replay Attacks (OBJ 2.4)
182 Session Hijacking (OBJ 2.4)
183 On-Path Attacks
184 Injection Attacks
185 Indicators of Compromise (IoC)

Hardening
186 Hardening (OBJ 2.5, 4.1, & 4.5)
187 Changing Default Configurations (OBJ 2.5)
188 Restricting Applications (OBJ 2.5)
189 Unnecessary Services (OBJ 2.5)
190 Trusted Operating Systems (OBJ 2.5)
191 Updates and Patches (OBJ 2.5)
192 Patch Management (OBJ 2.5)
193 Group Policies (OBJ 2.5 & 4.5)
194 SELinux (OBJ 2.5 & 4.5)
195 Data Encryption Levels (2.5)
196 Secure Baselines (OBJ 2.5 and 4.1)

Security Techniques
197 Security Techniques (OBJ 4.1 & 4.5)
198 Wireless Infrastructure Security (OBJ 4.1)
199 Wireless Security Settings (OBJ 4.1)
200 Application Security (OBJ 4.1)
201 Network Access Control (NAC) (OBJ 4.5)
202 Web and DNS Filtering (OBJ 4.5)
203 Email Security (OBJ 4.5)
204 Endpoint Detection and Response (OBJ 4.5)
205 User Behavior Analytics (OBJ 4.5)
206 Selecting Secure Protocols (OBJ 4.5)

Vulnerability Management
207 Vulnerability Management (OBJ 4.3)
208 Identifying Vulnerabilities (OBJ 4.3)
209 Threat Intelligence Feeds (OBJ 4.3)
210 Responsible Disclosure Programs (OBJ 4.3)
211 Analyzing Vulnerabilities (OBJ 4.3)
212 Conducting Vulnerability Scans (OBJ 4.3)
213 Assessing Vulnerability Scan Results (OBJ 4.3)
214 Vulnerability Response and Remediation (OBJ 4.3)
215 Validating Vulnerability Remediation (OBJ 4.3)
216 Vulnerability Reporting (OBJ 4.3)

Alerting and Monitoring
217 Alerting and Monitoring (OBJ 4.4)
218 Monitoring Resources (OBJ 4.4)
219 Alerting and Monitoring Activities (OBJ 4.4)
220 Simple Network Management Protocol (SNMP) (OBJ 4.4)
221 Security Information and Event Management (SIEM) (OBJ 4.4)
222 Data from Security Tools (OBJ 4.4)
223 Security Content Automation and Protocol (SCAP) (OBJ 4.4)
224 NetFlow and Flow Analysis
225 Single Pane of Glass (OBJ 4.4)

Incident Response
226 Incident Response (OBJ 4.8)
227 Incident Response Process (OBJ 4.8)
228 Threat Hunting (OBJ 4.8)
229 Root Cause Analysis (OBJ 4.8)
230 Incident Response Training and Testing (OBJ 4.8)
231 Digital Forensic Procedures (OBJ 4.8)
232 Data Collection Procedures (OBJ 4.8)
233 Disk Imaging and Analysis (OBJ 4.8)

Investigating an Incident
234 Investigating an Incident (OBJ 4.9)
235 Investigating with Data (OBJ 4.9)
236 Dashboards (OBJ 4.9)
237 Automated Reports (OBJ 4.9)
238 Vulnerability Scans (OBJ 4.9)
239 Packet Captures (OBJ 4.9)
240 Firewall Logs (OBJ 4.9)
241 Application Logs (OBJ 4.9)
242 Endpoint Logs (OBJ 4.9)
243 OS-specific Security Logs (OBJ 4.9)
244 IPSIDS Logs (OBJ 4.9)
245 Network Logs (OBJ 4.9)
246 Metadata (OBJ 4.9)

Automation and Orchestration
247 Automation and Orchestration (OBJ 4.7)
248 When to Automate and Orchestrate (OBJ 4.7)
249 Benefits of Automation and Orchestratation (OBJ 4.7)
250 Automating Support Tickets (OBJ 4.7)
251 Automating Onboarding (OBJ 4.7)
252 Automating Security (OBJ 4.7)
253 Automating Application Development (OBJ 4.7)
254 Integrations and APIs (OBJ 4.7)

Security Awareness
255 Security Awareness (OBJ 5.6)
256 Recognizing Insider Threats (OBJ 5.6)
257 Password Management (OBJ 5.6)
258 Avoiding Social Engineering (OBJ 5.6)
259 Policy and Handbooks (OBJ 5.6)
260 Remote and Hybrid Work Environments (OBJ 5.6)
261 Creating a Culture of Security (OBJ 5.6)

Conclusion
262 Conclusion
263 BONUS Where do I go from here

Practice Exam

Homepage