O'Reilly logo

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

CompTIA Security+ SY0-201 Video Course Domain 1 - Systems Security

Video Description

Systems Security

Shon Harris

The fast, powerful way to prepare for your CompTIA Security+ exam!

Get all the hands-on training you need to pass (ISC)²’s tough SSCP exam, get certified, and move forward in your IT security career! In this online video, the world’s #1 information security trainer walks you through every skill and concept you’ll need to master. This online video contains over three hours of training adapted from Shon Harris’s legendary five-day SSCP boot camps–including realistic labs, scenarios, case studies, and animations designed to build and test your knowledge in real-world settings!

Comprehensive coverage of CompTIA Security+ domains of knowledge:

     .    Blended Malware

     .    How to Buffer Overflow Works

     .    Identity Theft

     .    Buffer Overflow

     .    Hardware Security

     .    Personal Firewall

About the Shon Harris Security Series

This online video is part of a complete library of books, online services, and videos designed to help security professionals enhance their skills and prepare for their certification exams. Every product in this series reflects Shon Harris’s unsurpassed experience in teaching IT security professionals.

Category: Security

System Requirements

OPERATING SYSTEM: Windows 2000, XP, or Vista; Mac OS X 10.4 (Tiger) or later
MULTIMEDIA: DVD drive; 1024 x 768 or higher display; sound card with speakers
COMPUTER: 500MHz or higher CPU; 128MB RAM or more

Table of Contents

  1. Course Introduction 00:06:59
  2. Domain 1 - Systems Security 00:01:06
  3. Security+ Placement 00:00:42
  4. Security+ and DoD 8570 Mandate 00:01:25
  5. Privilege Escalation 00:01:55
  6. Agenda 11 00:01:57
  7. Boot Sector Invasion 00:00:36
  8. Few Other Types 00:00:46
  9. How Do They Work? 00:01:27
  10. More Malware 00:02:16
  11. Blended Malware 00:02:11
  12. A Back Orifice Attack! 00:00:59
  13. NetBus 00:00:40
  14. Hoaxes 00:00:56
  15. Agenda 12 00:01:02
  16. Signature Scanning 00:00:58
  17. Monitoring Activities 00:00:56
  18. Monitoring for Changes 00:01:21
  19. More Bad Stuff 00:04:36
  20. Circumventing Access Controls 00:01:17
  21. Attacks 00:00:51
  22. TOC/TOU Examples 00:00:38
  23. Attack Type - Race Condition 00:01:50
  24. Attacking Through Applications 00:03:53
  25. How a Buffer Overflow Works 00:01:39
  26. Watching Network Traffic 00:01:23
  27. Traffic Analysis 00:01:07
  28. Functionally Two Different Types of Rootkits 00:01:19
  29. Examples of Trojaned Files 00:00:48
  30. Exploitation 00:02:10
  31. Trojans (2) 00:02:07
  32. Types of Trojan 00:01:56
  33. Back Orifice 2000 00:00:54
  34. Sub7 00:01:22
  35. Defenses to Trojan 00:01:39
  36. Backdoor 00:01:30
  37. How 'Netcat' Works as a Backdoor 00:00:54
  38. VNC - Virtual Network Computing 00:01:22
  39. Backdoor Defenses 00:02:10
  40. Rootkit 00:01:26
  41. Popular Rootkits 00:00:44
  42. Unix Rootkit Prevention 00:04:21
  43. Windows Rootkit Prevention 00:01:08
  44. Botnet 00:01:35
  45. Show Me the Money! 00:01:12
  46. Botnet (2) 00:02:08
  47. Another Common Attack 00:01:02
  48. Identity Theft 00:01:19
  49. Fake Login Tools 00:00:42
  50. How Do These Attacks Work? 00:00:33
  51. Attempts to Get Your Credentials 00:01:02
  52. Instructional Emails 00:01:26
  53. Knowing What You Are Disposing of Is Important 00:01:18
  54. Other Examples 00:00:46
  55. Another Danger to Be Aware of... Spyware 00:02:07
  56. Is Someone Watching You? 00:02:11
  57. What Does This Have to Do with My Computer? 00:01:17
  58. Sometimes You Know that Software Is Installing on Your System 00:02:54
  59. Provide the Hackers with Tools 00:02:09
  60. Common Web Server Flaws 00:01:08
  61. Improper Data Validation 00:01:59
  62. Uniform Resource Locator (URL) 00:02:00
  63. Directory Traversal 00:01:04
  64. Buffer Overflow 00:00:57
  65. Cross-Site Scripting Attack 00:01:51
  66. Common SQL Injection Attack 00:01:30
  67. Attacking Mis-configurations 00:01:12
  68. CGI Information 00:00:44
  69. Logging Activities 00:00:43
  70. Are ALL Patches Applied? 00:00:39
  71. Instant Messaging 00:03:02
  72. Browser 00:04:07
  73. P2P 00:03:21
  74. P2P Security 00:01:06
  75. P2P Networks - Common Attacks 00:00:52
  76. Hardware Security 00:08:26
  77. Removable Media 00:01:08
  78. Magnetic Media 00:03:17
  79. Optical Media 00:01:53
  80. Electronic Media 00:01:17
  81. Memory Cards 00:01:27
  82. Memory Card Characteristics 00:00:35
  83. USB Devices 00:04:27
  84. Data Leakage Prevention 00:02:17
  85. NAS 00:03:45
  86. Security Templates 00:04:36
  87. Security Suite Components 00:06:10
  88. Security Best Practices - Summary 00:04:49
  89. Security Suite Components 00:03:06
  90. Personal Firewall 00:00:58
  91. Personal Firewall Features 00:02:08
  92. Antivirus 00:03:02
  93. Anti-spam 00:11:35
  94. Popup Blockers 00:01:08
  95. Security Suite 00:01:00
  96. Security Suite Components 00:01:16
  97. Virtualization Technology 00:00:49
  98. Virtual Machine 00:05:48
  99. VMWare 00:01:31
  100. Approaches to Application Virtualization 00:03:18
  101. Domain 1 Review 00:00:39