O'Reilly logo

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

CompTIA Security+ SY0-401

Video Description

CompTIA's Security+ is a vendor-neutral certification that validates the competency of security professionals working in the IT industry. The Security Plus Certification confirms a technician's critical knowledge of communication security, infrastructure security, cryptography, operational security, and general security concepts. Because human error is the number one cause for a network security breach, CompTIA Security+ is recognized by the technology community as a valuable credential that proves competency with information security.

Table of Contents

  1. Course Introduction
    1. Course Introduction 00:00:20
  2. Module 1
    1. General Security Concepts 00:00:21
    2. Security+ Exam Domains 00:03:34
    3. Basic Terminology 00:03:27
    4. Additional Security Goals 00:04:46
    5. Host Security 00:04:46
    6. Additional Security Concepts 00:05:25
    7. Module 1 Close 00:00:11
  3. Module 2
    1. Organizational Security 00:00:18
    2. What is a Security Program 00:01:37
    3. Operational Process 00:03:30
    4. Password Policies 00:03:11
    5. Demo - Password Policies 00:03:38
    6. Social Engineering 00:02:48
    7. Security Policies 00:03:20
    8. Concepts the Support Policies 00:03:38
    9. Human Resources Policies 00:02:23
    10. Module 2 Close 00:00:15
  4. Module 3
    1. Privacy, Ethics and Legal issues 00:00:25
    2. Cybercrime 00:03:55
    3. Reactions to Cybercrime Part1 00:04:00
    4. Reactions to Cybercrime Part2 00:04:00
    5. Module 3 Close 00:00:19
  5. Module 4
    1. Cryptography 00:00:19
    2. Cryptography Explained 00:04:43
    3. Ciphers 00:02:33
    4. Cryptographic Math and Hashing 00:04:07
    5. Algorithms and Encryption Part1 00:04:41
    6. Algorithms and Encryption Part2 00:04:27
    7. Algorithms and Encryption Part3 00:05:43
    8. Symmetric and Asymmetric Working Together 00:04:02
    9. Digital Signatures 00:04:46
    10. Module 4 Close 00:00:17
  6. Module 5
    1. Public Key Infrastructure 00:00:21
    2. Basics of Public Key Infrastructures 00:05:51
    3. Certificate Hierarchies 00:06:03
    4. Trust and Certificate Verification 00:04:07
    5. Types of Certificates and Extensions 00:03:47
    6. Certificate Revocation List 00:04:51
    7. Key Protection 00:04:36
    8. Key Recovery 00:05:03
    9. Trust Models 00:05:02
    10. Module 5 Close 00:00:24
  7. Module 6
    1. Standards and Protocols 00:00:28
    2. Standards and Protocols Supporting PKI 00:05:26
    3. SSL and TLS 00:05:23
    4. S/MIME 00:04:57
    5. IPsec 00:02:58
    6. Common Criteria - CC 00:03:47
    7. Module 6 Close 00:00:35
  8. Module 7
    1. Physical Security 00:00:24
    2. Physical Security Measures 00:04:40
    3. Access Controls and Monitoring 00:06:05
    4. Biometrics 00:03:45
    5. Module 7 Close 00:04:45
  9. Module 8
    1. Infrastructure Security 00:00:30
    2. Infrastructure Security - Printers and Workstations 00:04:45
    3. Servers and Devices 00:07:08
    4. VLANs and Firewalls 00:09:17
    5. Securing Wireless Access Points 00:05:23
    6. VPN - Network Access Control 00:05:07
    7. Network Monitoring 00:06:13
    8. Handling Big Data and Physical Security 00:04:33
    9. Security Zones, VLANs and NAT 00:03:47
    10. Virtualization and Cloud Computing 00:04:32
    11. Module 8 Close 00:00:18
  10. Module 9
    1. Authentication and Remote Access 00:00:17
    2. Remote Access and Kerberos 00:04:48
    3. Alternatives to Passwords 00:05:34
    4. Other Protocols 00:04:29
    5. Federated Authentication 00:03:09
    6. HOTP and TOTP 00:07:24
    7. Remote Access Protocols Authentication 00:03:50
    8. Module 9 Close 00:00:16
  11. Module 10
    1. Wireless Security 00:00:22
    2. Wireless Networking 00:05:17
    3. Bluetooth 00:06:27
    4. Controlling the Radio Waves 00:04:11
    5. WPA Encryption 00:03:25
    6. Module 10 Close 00:00:12
  12. Module 11
    1. Intrusion Detection Systems 00:00:21
    2. Intrusion Detection Systems - HIDs 00:05:17
    3. HIDs Advancements and Anti-Virus 00:04:03
    4. Demo - Windows Defender 00:03:50
    5. Network-Based IDSs 00:04:10
    6. Content-Based Signatures and Proxy Servers 00:06:33
    7. Protocol Analyzers 00:03:25
    8. Anti-Spam Techniques 00:03:26
    9. Module 11 Close 00:00:13
  13. Module 12
    1. Security Baselines 00:00:14
    2. Overview of Baselines 00:04:50
    3. Operating System Hardening 00:07:37
    4. Demo - Windows Update 00:03:20
    5. Network Hardening 00:02:47
    6. Application Hardening and Patch Management Part1 00:03:58
    7. Application Hardening and Patch Management Part2 00:02:53
    8. Module 12 Close 00:00:15
  14. Module 13
    1. Attacks and Malicious Software 00:00:08
    2. Avenues of Attack 00:04:54
    3. Minimizing Possible Avenues of Attack 00:06:48
    4. DDOS Mitigation 00:02:29
    5. Null Sessions and Privilege Escalation 00:03:44
    6. IP Address Spoofing 00:05:35
    7. Replay Attacks and TCP/IP Hijacking 00:06:50
    8. Password Attacks and Software Exploitation 00:04:48
    9. Viruses 00:04:24
    10. Other Malware 00:06:17
    11. Module 13 Close 00:00:18
  15. Module 14
    1. E-mail and Instant Messaging 00:00:10
    2. End User Issues with Email 00:03:49
    3. Enterprise Mitigation Techniques 00:02:52
    4. Module 14 Close 00:00:10
  16. Module 15
    1. Web Components 00:00:09
    2. Web Components and Concerns 00:05:24
    3. HTTP and HTTPS 00:05:27
    4. Code-Based Vulnerabilities 00:05:01
    5. Mitigations and Cookies 00:03:08
    6. Application-Based Weaknesses 00:02:01
    7. Module 15 Close 00:00:23
  17. Module 16
    1. Disaster Recovery and Business Continuity 00:00:17
    2. Disaster Recovery 00:05:02
    3. Backups 00:04:42
    4. Storage Considerations 00:02:41
    5. Raid 00:05:23
    6. Module 16 Close 00:00:15
  18. Module 17
    1. Risk Management 00:00:16
    2. Risk Management Key Terms 00:05:40
    3. Risk Management Process 00:04:39
    4. General Risk Management Model 00:04:15
    5. Software Engineering Institute Model 00:05:03
    6. Common Objective Approach 00:04:42
    7. Security Integration Issues with Third Parties 00:02:29
    8. Module 17 Close 00:00:26
  19. Module 18
    1. Change Management 00:00:30
    2. Change Management Procedures 00:04:10
    3. Change Management Workflow 00:02:28
    4. Maintaining Code Integrity 00:02:44
    5. Module 18 Close 00:00:17
  20. Module 19
    1. Privilege Management 00:00:18
    2. Privilege Management Details 00:03:54
    3. Centralized Management 00:04:42
    4. Access Control Models 00:05:39
    5. Module 19 Close 00:00:15
  21. Module 20
    1. Computer Forensics 00:00:12
    2. Computer Forensics and Evidence 00:05:16
    3. The Investigative Process 00:05:09
    4. Module 20 Close 00:00:17