O'Reilly logo

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

CompTIA Security+ Certification; SY0-401. The Total Course

Video Description

Everything you need to pass the CompTIA Security+ SY0-401 Exam, from Mike Meyers. CompTIA expert and bestselling author.

About This Video

  • Topics include Risk management, Cryptography, Authentication and authorization.

  • Learn more on Host, LAN, and application security, Wireless, cloud and mobile security.

  • Learn also about Environmental and personnel security and controls.

  • In Detail

    The course covers all the CompTIA Security+ SY0-401 Objective Domains.

    Topics include: Risk management, Cryptography, Authentication and authorization, · Host, LAN, and application security, Wireless, cloud and mobile security., Environmental and personnel security and controls.

    This is a Total Security+ Course, it covers everything a good tech needs to know and prepares you to pass the CompTIA Security+ Certification exam.

    Table of Contents

    1. Chapter 1 : The CompTIA Security+ Exam
      1. Introduction to CompTIA Security+ Exam SY0-401 00:02:59
      2. The Security+ Exam basics 00:06:16
      3. Passing the Security+ Exam 00:04:34
    2. Chapter 2 : Stepping Up to IT Security
      1. The CIA of Security 00:03:47
      2. Security Controls 00:03:58
      3. Interesting Security Controls 00:04:05
      4. IT Security Governance 00:08:19
      5. Security Policies 00:08:18
      6. What is Risk? 00:09:53
      7. Managing Risk 00:11:58
      8. Quantitative Risk Calculations 00:08:11
    3. Chapter 3 : Core Security Concepts
      1. Cryptography Basics 00:10:20
      2. Hashing 00:07:16
      3. Hash-based Message Authentication Code – HMAC 00:03:47
      4. Symmetric Algorithms 00:11:45
      5. Asymmetric Algorithms 00:16:23
      6. Secure Applications and Protocols 00:10:55
      7. Steganography 00:05:38
      8. Certificates and Trust 00:14:15
      9. Public Key Infrastructure 00:20:49
    4. Chapter 4 : Authentication and Authorization
      1. Identification and Authentication 00:12:49
      2. Understanding Authorization 00:08:28
      3. Authentication Methods 00:09:50
      4. AAA 00:08:04
      5. Linux File Permissions 00:14:31
      6. Windows File Systems 00:15:19
      7. Single Sign On 00:10:09
      8. Password Security 00:09:14
      9. Account Issues 00:06:44
    5. Chapter 5 : Host Security
      1. Host Threats 00:09:01
      2. Malware 00:10:04
      3. Cryptographic Attacks 00:24:14
      4. Man-in-the-middle 00:22:13
      5. Denial of Service 00:08:34
      6. Host Hardening 00:16:17
      7. Network Models 00:06:57
      8. Know your protocols-TCP/IP 00:06:07
      9. Know your protocols-Applications 00:05:43
      10. Transport Layer Security – TLS 00:12:25
      11. IPsec 00:11:56
      12. NAS and SAN 00:16:02
      13. RAID Security 00:11:15
      14. Securing Data 00:04:22
      15. Disk Encryption 00:06:42
      16. Static Hosts 00:07:31
    6. Chapter 6 : LAN Security
      1. LAN Security Review 00:08:01
      2. Access Control Lists 00:04:51
      3. Proxy Servers 00:16:14
      4. IDS vs. IPS 00:04:29
      5. Network Access Control 00:10:31
      6. Virtual Private Networks 00:13:47
      7. SNMP 00:15:23
      8. Logs 00:11:11
    7. Chapter 7 : Application Security
      1. Attacking Applications 00:10:57
      2. Attacking Websites 00:07:56
      3. Hardening Web Servers 00:10:33
      4. Internet Service Hardening 00:06:43
      5. Virtualization Basics 00:07:16
      6. Virtual Security 00:15:02
    8. Chapter 8 : Wireless Security
      1. Wireless Review 00:09:44
      2. Living in Open Networks 00:09:41
      3. Fun with Access Points 00:07:01
      4. Cracking 802.11 Part 1 – WEP 00:11:58
      5. Cracking 802.11 Part 2 – WPA 00:09:41
      6. Cracking 802.11 Part 3 – WPS 00:09:50
      7. Wireless Hardening 00:14:04
    9. Chapter 9 : Physical Security
      1. RFI, EMI, ESD 00:03:13
      2. HVAC 00:07:26
      3. Fire Suppression 00:04:02
      4. Classifying Security Controls 00:06:09
      5. Physical Controls 00:08:44
    10. Chapter 10 : Outside Security
      1. Third Party Agreements 00:08:46
      2. Infrastructure as a Service (IaaS) 00:09:32
      3. Platform as a Service (PaaS) 00:09:04
      4. Software as a Service (SaaS) 00:02:39
      5. Deploying Mobile Devices 00:07:09
      6. Mobile Device Management 00:10:25
    11. Chapter 11 : People Security
      1. Social Engineering Principles 00:02:15
      2. Social Engineering Attacks 00:07:55
      3. Security Training 00:10:01
    12. Chapter 12 : Proactive Security
      1. Vulnerability Scanning Tools 00:09:24
      2. Vulnerability Assessment 00:04:43
      3. Penetration (Pen) Testing 00:11:21
      4. Incident Response 00:06:28
      5. Forensic Procedures 00:11:36
      6. Contingency Planning 00:10:10
      7. Backups 00:07:43