Autoplay
Autocomplete
Previous Lesson
Complete and Continue
SECURITY+ 501: BECOME A SECURITY ENGINEER
MEET YOUR INSTRUCTOR
MEET DWAINE "ROB" ROBERTS (0:54)
Quick Tour
CompTIA Security+ Exam Objectives Breakdown
DOMAIN 1.0 ATTACKS, THREATS AND VULNERABILITIES
DOMAIN 1 INTRO (0:36)
TYPES OF MALWARE (17:34)
CASE STUDY : CRYPTICLOCKER
LETS SEE WHAT YOU KNOW: MALWARE QUIZ
SOCIAL ENGINEERING
TYPES OF SOCIAL ENGINEERING (15:19)
SCAMMERS (3:52)
CASE STUDY: YAHOO EMPLOYEE MESSES UP BIG TIME (1:30)
LETS SEE WHAT YOU KNOW: SOCIAL ENGINEERING QUIZ
APPLICATION ATTACKS
APPLICATION ATTACKS (12:29)
CASE STUDY: YOU'VE GOT MAIL
LETS SEE WHAT YOU KNOW: APP ATTACK QUIZ
WIRELESS ATTACKS
WIRELESS ATTACK TYPES (7:14)
SECURING ACCESS POINTS (7:19)
LETS SEE WHAT YOU KNOW: WIRELESS ATTACKS
CRYPTOGRAPHY ATTACKS
ATTACK TYPES (7:59)
CASE STUDY: DON'T KEEP ALL YOUR EGGS IN ONE BASKET
LETS SEE WHAT YOU KNOW: CRYPTOGRAPHY ATTACKS
THREAT ACTORS & ATTRIBUTES
THREAT ACTORS (10:22)
CASE STUDY: WE HAVE TO GET OUR MESSAGE OUT
LET'S SEE WHAT YOU KNOW: THREAT ACTORS QUIZ
PENETRATION TESTING
PENETRATION TESTING (10:02)
EXERCISE: BREAKING IN
LET'S SEE WHAT YOU KNOW: PENETRATION TESTING QUIZ
VULNERABILITY TESTING
VULNERABILITY SCANS (10:43)
LET'S SEE WHAT YOU KNOW: VULNERABILITY QUIZ
VULNERABILITY IMPACT
IMPACT OF VULNERABILITIES (19:25)
VULNERABILITY VS PENETRATION
CASE STUDY: FACE OFF
ATTACKS, THREATS AND VULNERABILITIES REVIEW TEST
DOMAIN 1.0 ATTACKS, THREATS AND VULNERABILITIES TEST
DOMAIN 2.0 TECHNOLOGIES AND TOOLS
DOMAIN 2 INTRO (0:23)
HARDWARE AND SOFTWARE SECURITY TOOLS (26:09)
LETS SEE WHAT YOU KNOW: HARDWARE AND SECURITY TOOLS QUIZ
ASSESSING SECURITY POSTURE
SOFTWARE SECURITY TOOLS (16:25)
COMMAND LINE TOOLS (8:43)
LETS SEE WHAT YOU KNOW: SECURITY POSTURE QUIZ
COMMON SECURITY ISSUES
COMMON SECURITY ISSUES (15:42)
LETS SEE WHAT YOU KNOW: COMMON ISSUES QUIZ
SECURITY OUTPUT
SECURITY TECHNOLOGY OUTPUT (10:49)
LETS SEE WHAT YOU KNOW: SECURITY OUTPUTS QUIZ
MOBILE DEVICE SECURITY
MOBILE DEVICE SECURITY (18:58)
CASE STUDY: FACEBOOK DATA LEAKS
SECURITY PROTOCOLS
SECURITY PROTOCOLS (12:31)
Lets See What You Know: Protocols Quiz
DOMAIN 2.0 TECHNOLOGIES AND TOOLS TEST
TECHNOLOGIES AND TOOLS TEST
DOMAIN 3.0 ARCHITECTURE AND DESIGN
DOMAIN 3 INTRO (0:27)
BEST SECURITY PRACTICES (7:26)
Case Study: Hungry Hungry HIPPA
SECURING NETWORK ARCHITECTURE
SCENARIO'S: SECURING NETWORK ARCHITECTURE (19:06)
HERES YOUR MISSION (2:02)
SECURE SYSTEM DESIGN
SCENARIO'S: SECURE SYSTEM DESIGN (13:09)
I'M LOVIN IT (1:19)
SECURE DEVELOPMENT
SECURE DEVELOPMENT (5:45)
EMBEDDED SYSTEMS
EMBEDDED SYSTEMS (12:14)
HOME SWEET HOME: HOW SMART IS YOUR HOUSE? (1:58)
DEPLOYMENT CONCEPTS
DEPLOYMENT MODELS (13:58)
VIRTUAL CONCEPTS
VIRTUAL CONCEPTS (12:48)
RESILIENCY
AUTOMATION (8:40)
DOMAIN 3.0 ARCHITECTURE AND DESIGN TEST
ARCHITECTURE AND DESIGN TEST
DOMAIN 4.0 IDENTITY & ACCESS MANAGEMENT
DOMAIN 4 INTRO (0:27)
SECURING THE DATA CENTER
ACCESS SERVICES
SCENARIO'S: ACCESS SERVICES (10:56)
LETS SEE WHAT YOU KNOW: ACCESS SERVICES QUIZ
ACCESS SERVICE MODELS
ACCESS SERVICE MODELS (7:16)
LETS SEE WHAT YOU KNOW: ACCESS SERVICE MODEL QUIZ
ACCOUNT MANAGEMENT
ACCOUNT MANAGEMENT (9:47)
LETS SEE WHAT YOU KNOW: ACCOUNT MANAGEMENT
DOMAIN 4.0 ACCESS MANAGEMENT REVIEW TEST
ACCESS MANAGEMENT REVIEW TEST
DOMAIN 5.0 RISK MANAGEMENT
DOMAIN 5 INTRO (0:36)
ORGANIZATIONAL SECURITY (11:06)
LETS SEE WHAT YOU KNOW: ORGANIZATIONAL SECURITY
BUSINESS IMPACT
BUSINESS IMPACT (8:21)
LETS SEE WHAT YOU KNOW: RECOVERY QUIZ
RISK MANAGEMENT
RISK ASSESSMENT (11:09)
LETS SEE WHAT YOU KNOW: RISK RESPONSE QUIZ
INCIDENT RESPONSE
INCIDENT RESPONSE (8:02)
FORENSICS
FORENSICS (8:34)
CONTINUITY
CONTINUITY (6:27)
DATA SOVEREIGNTY: DOING BUSINESS WORLDWIDE (0:44)
DOMAIN 5.0 RISK MANAGEMENT TEST
RISK MANAGEMENT TEST
DOMAIN 6.0 CRYPTOGRAPHY & PKI
CRYPTO CONCEPTS (12:44)
LETS SEE WHAT YOU KNOW: CRYPTO CONCEPTS
CRYPTOGRAPHY
ALGORITHMS (8:08)
WIRELESS SECURITY
SCENARIO'S: WIRELESS SECURITY (5:41)
CERTIFICATION EXAM PREP
ACRONYMS YOU NEED TO KNOW
FINAL PRETEST
EXAM PREP LECTURE (31:04)
SHORT SCENARIO 1
SHORT SCENARIO 2
SHORT SCENARIO 3
FINAL EXAM
TAKING A COMPTIA EXAM (7:05)
NEXT STEPS (1:20)
SO HOW WAS THE COURSE?
LET'S SEE WHAT YOU KNOW: THREAT ACTORS QUIZ
Lesson content locked
If you're already enrolled,
you'll need to login
.
Enroll in Course to Unlock