O'Reilly logo

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

CompTIA Security+ Certification (Exam SY0-401)

Video Description

Network and computer security used to be a high proiority, now security has become an absolute necessity. Understanding the fundamentals of network and computer security is a must in today's environment. CompTIA's Security+ certification is recognized around the world as validation that you know about the fundamental network and computer security practices and actions as well as the technologies involved. Earning the Security+ certification will open doors in the Information Technology workplace. In this course, Mark Long goes step-by-step to help you understand the various technologies and techniques to help you prepare for the CompTIA Security+ SY0-401 exam. Mark has been working in Information Technology for over 25 years and has worked in data security in the corporate environment and brings real-world knowledge to help you get ready for this exam.

Table of Contents

  1. Welcome/intro
    1. Welcome/intro 00:01:27
    2. Course Overview 00:04:12
    3. Why Security+ 00:06:18
  2. About the Exam
    1. What to Expect on the Exam 00:03:27
    2. How to Prepare 00:06:16
    3. How to Take the Exam 00:05:31
  3. Computer Security Basics
    1. Security Basics 00:05:15
    2. Security Threats 00:05:17
    3. Securing Computer Hardware 00:06:14
    4. Securing Storage Devices 00:06:44
    5. Security Removable Media 00:05:04
    6. Securing Storage Devices Demo 00:03:08
    7. Malicious Software pt. 1 00:06:16
    8. Malicious Software pt. 2 00:05:27
    9. Preventing Malicious Software 00:04:59
    10. Understanding Physical Security 00:06:47
    11. Hardware Disposal 00:03:46
  4. Network Design
    1. Network Security Basics 00:06:49
    2. Understanding Firewalls 00:03:38
    3. Firewall Operations 00:05:38
    4. Network Address Translation 00:06:06
    5. Switches 00:05:19
    6. Routers 00:05:44
    7. Network Security Devices 00:06:41
    8. Understanding VLANs 00:05:15
    9. Cloud Computing Basics 00:05:55
    10. Cloud Computing Types 00:06:26
    11. Security in the Cloud 00:06:12
    12. Securing Servers 00:06:18
  5. Network Protocols and Threats
    1. Network Protocol Basics 00:06:51
    2. Understanding Ports 00:05:20
    3. Common Ports 00:04:50
    4. Network Attacks pt. 1 00:06:26
    5. Network Attacks pt. 2 00:06:54
    6. Honeypots and Honeynets 00:06:10
    7. Intrusion Detection Systems 00:05:01
    8. NIDS and NIPS 00:06:54
    9. Unified Threat Management 00:04:20
  6. Access Control
    1. Access Control Basics 00:06:14
    2. Authentication and Authorization 00:04:55
    3. Users, Groups, and Permissions 00:06:10
    4. Authentication Services 00:06:51
    5. Usernames and Passwords 00:05:38
    6. Permissions Inheritance 00:05:59
    7. File and Folder Permissions 00:05:55
    8. Remote Authentication 00:05:02
  7. Securing Applications
    1. Application Security Basics 00:06:56
    2. Application Attacks 00:06:06
    3. Securing the Browser 00:06:59
    4. Preventing Application Attacks 00:04:37
  8. Monitoring and Auditing
    1. Monitoring Basics 00:05:19
    2. Monitoring Tools 00:05:54
    3. Network Monitor 00:05:52
    4. Auditing Basics 00:06:07
  9. OS Hardening
    1. What is System Hardening? 00:05:48
    2. Network Device Hardening 00:04:51
    3. Understanding Virtualization 00:06:00
    4. Virtual Machine Security 00:05:59
  10. Encryption
    1. Cryptography and Encryption 00:06:17
    2. Symmetric vs. Asymmetric 00:06:24
    3. Understanding Hashing pt. 1 00:06:06
    4. Understanding Hashing pt. 2 00:02:18
    5. Public Key Infrastructure pt. 1 00:06:01
    6. Public Key Infrastructure pt. 2 00:05:14
  11. Disaster Recovery
    1. Disaster Recovery Basics 00:05:21
    2. Redundancy Basics 00:04:52
    3. High Availability 00:06:13
    4. Redundancy Planning 00:05:08
    5. Fault Tolerance 00:04:19
    6. RAID Levels pt. 1 00:04:22
    7. RAID Levels pt. 2 00:05:19
  12. Risk Assessment and Vulnerability
    1. Dealing with Security Risks pt. 1 00:06:19
    2. Dealing with Security Risks pt. 2 00:03:46
    3. Risk Analysis Options 00:03:21
    4. Risk Mitigation 00:06:29
    5. Data Loss Preventions 00:03:39
    6. Third Party Risks 00:06:48
  13. The Three P's
    1. Policies, Procedures & People 00:04:38
    2. Data Classification 00:05:54
    3. Social Engineering pt. 1 00:06:10
    4. Social Engineering pt. 2 00:04:57
    5. Environmental Threats 00:06:06
    6. User Education 00:03:34
    7. Incident Response Procedures 00:06:16
  14. Course Wrap-Up
    1. Course Wrap-Up 00:04:22
  15. About the Author
    1. About the Author 00:03:42