Autoplay
Autocomplete
Previous Lesson
Complete and Continue
5. SECURITY+: FINAL STEP (WEEKS13-16)
MEET YOUR INSTRUCTOR
MEET DWAINE "ROB" ROBERTS (0:54)
Quick Tour
Success Road Map
CompTIA Security+ Exam Objectives Breakdown
DOMAIN 1.0 ATTACKS, THREATS, AND VULNERABILITIES
DOMAIN 1 INTRO (0:36)
TYPES OF SOCIAL ENGINEERING (15:19)
SCAMMERS (3:52)
CASE STUDY: YAHOO EMPLOYEE MESSES UP BIG TIME (1:30)
STORYTIME: INFLUENCE CAMPAIGN
LETS SEE WHAT YOU KNOW: SOCIAL ENGINEERING QUIZ
MALWARE
TYPES OF MALWARE (17:26)
CASE STUDY : CRYPTICLOCKER
STORYTIME: ADVERSARIAL ARTIFICIAL INTELLIGENCE (1:21)
LETS SEE WHAT YOU KNOW: MALWARE QUIZ
APPLICATION ATTACKS
APPLICATION ATTACKS (12:29)
CASE STUDY: YOU'VE GOT MAIL
LETS SEE WHAT YOU KNOW: APP ATTACK QUIZ
WIRELESS ATTACKS
WIRELESS ATTACK TYPES (7:14)
SECURING ACCESS POINTS (7:15)
STORYTIME: MALICIOUS CODE & SCRIPTS
LETS SEE WHAT YOU KNOW: WIRELESS ATTACKS
THREAT ACTORS & ATTRIBUTES
THREAT ACTORS (10:22)
CASE STUDY: WE HAVE TO GET OUR MESSAGE OUT
STORYTIME: DARK WEB
LET'S SEE WHAT YOU KNOW: THREAT ACTORS QUIZ
CRYPTOGRAPHY ATTACKS
ATTACK TYPES (7:59)
CASE STUDY: DON'T KEEP ALL YOUR EGGS IN ONE BASKET
LETS SEE WHAT YOU KNOW: CRYPTOGRAPHY ATTACKS
VULNERABILITY TESTING
VULNERABILITY SCANS (10:43)
LET'S SEE WHAT YOU KNOW: VULNERABILITY QUIZ
PENETRATION TESTING
PENETRATION TESTING (10:02)
EXERCISE: BREAKING IN
STORY TIME: WHAT TEAM ARE YOU ON?
LET'S SEE WHAT YOU KNOW: PENETRATION TESTING QUIZ
VULNERABILITY IMPACT
IMPACT OF VULNERABILITIES (19:25)
VULNERABILITY VS PENETRATION
CASE STUDY: FACE OFF
ATTACKS, THREATS, AND VULNERABILITIES REVIEW TEST
DOMAIN 1.0 ATTACKS, THREATS, AND VULNERABILITIES TEST
DOMAIN 2.0 ARCHITECTURE AND DESIGN
DOMAIN 2 INTRO (0:22)
BEST SECURITY PRACTICES (7:26)
CASE STUDY: HUNGRY HUNGRY HIPPA
DEPLOYMENT CONCEPTS
DEPLOYMENT MODELS (13:58)
VIRTUAL CONCEPTS (12:48)
SECURE DEVELOPMENT
SECURE DEVELOPMENT (5:45)
AUTHENTICATION VS AUTHORIZATION
DESIGN CONCEPTS (1:41)
RESILIENCY
AUTOMATION (8:40)
EMBEDDED SYSTEMS
EMBEDDED SYSTEMS (11:55)
HOME SWEET HOME: HOW SMART IS YOUR HOUSE? (1:58)
PHYSICAL SECURITY
SECURITY CONTROLS (5:27)
CRYPTOGRAPHY
CRYPTO CONCEPTS (12:44)
ALGORITHMS (8:08)
LETS SEE WHAT YOU KNOW: CRYPTO CONCEPTS
DOMAIN 2.0 ARCHITECTURE AND DESIGN TEST
ARCHITECTURE AND DESIGN TEST
DOMAIN 3.0 IMPLEMENTATION
DOMAIN 3 INTRO (0:27)
SECURITY PROTOCOLS (12:31)
Lets See What You Know: Protocols Quiz
SECURITY PROTOCOLS
HARDWARE AND SOFTWARE SECURITY TOOLS (26:09)
LETS SEE WHAT YOU KNOW: HARDWARE AND SECURITY TOOLS QUIZ
SECURING NETWORK ARCHITECTURE
SCENARIO'S: SECURING NETWORK ARCHITECTURE (19:06)
HERES YOUR MISSION (2:02)
WIRELESS SECURITY
SCENARIO'S: WIRELESS SECURITY (5:41)
MOBILE DEVICE SECURITY
MOBILE DEVICE SECURITY (18:58)
CASE STUDY: FACEBOOK DATA LEAKS
SECURE SYSTEM DESIGN
SCENARIO'S: SECURE SYSTEM DESIGN (13:09)
I'M LOVIN IT (1:19)
ACCOUNT MANAGEMENT
SCENARIO'S: ACCESS SERVICES (10:56)
ACCESS SERVICE MODELS (7:16)
ACCOUNT MANAGEMENT (9:47)
COMMON SECURITY ISSUES
COMMON SECURITY ISSUES (15:42)
LETS SEE WHAT YOU KNOW: COMMON ISSUES QUIZ
Weekly Progress Report
DOMAIN 3.0 IMPLEMENTATION
IMPLEMENTATION TEST
* MOTIVATION BREAK* (9:58)
DOMAIN 4.0 OPERATIONS AND INCIDENT RESPONSE
DOMAIN 4 INTRO (0:19)
INCIDENT RESPONSE (8:02)
LETS SEE WHAT YOU KNOW: INCIDENT RESPONSE QUIZ
SCENARIO: LET'S SECURE THE DATA CENTER
ASSESSING SECURITY POSTURE
SOFTWARE SECURITY TOOLS (16:25)
COMMAND LINE TOOLS (8:43)
LETS SEE WHAT YOU KNOW: SECURITY POSTURE QUIZ
SECURITY OUTPUT
SECURITY TECHNOLOGY OUTPUT (10:49)
LETS SEE WHAT YOU KNOW: SECURITY OUTPUTS QUIZ
FORENSICS
FORENSICS (8:34)
LET'S SEE WHAT YOU KNOW: FORENSICS
DOMAIN 4.0 OPERATIONS AND INCIDENT RESPONSE REVIEW TEST
OPERATIONS AND INCIDENT RESPONSE TEST
DOMAIN 5.0 GOVERNANCE, RISK, AND COMPLIANCE
DOMAIN 5 INTRO (0:36)
RISK ASSESSMENT (11:09)
LETS SEE WHAT YOU KNOW: RISK ASSETMENT QUIZ
BUSINESS IMPACT
BUSINESS IMPACT (8:21)
LETS SEE WHAT YOU KNOW: RECOVERY QUIZ
ORGANIZATIONAL SECURITY
ORGANIZATIONAL SECURITY (11:06)
LETS SEE WHAT YOU KNOW: ORGANIZATIONAL SECURITY
CONTINUITY
CONTINUITY (6:27)
DATA SOVEREIGNTY: DOING BUSINESS WORLDWIDE (0:44)
PRIVACY AND DATA CONCEPTS
PRIVACY AND DATA CONCEPTS (13:49)
DOMAIN 5.0 GOVERNANCE, RISK, AND COMPLIANCE TEST
GOVERNANCE, RISK, AND COMPLIANCE TEST
Weekly Progress Report
PERFORMANCE BASED SCENARIOS
Where's My Money?
Governance, Risk, and Compliance
Threats And Vulnerabilities
Security Implementation
Security Incident Handling
CERTIFICATION EXAM PREP
ACRONYMS YOU NEED TO KNOW
PRETEST
EXAM PREP LECTURE (10:30)
SHORT SCENARIO 1
SHORT SCENARIO 2
SHORT SCENARIO 3
PREPARING FOR THE FINAL EXAM (3:05)
FINAL EXAM
CRITICAL THINKING EXERCISE *MANDATORY TO RECEIVE VOUCHER*
TAKING A COMPTIA EXAM (7:05)
SO HOW WAS THE PROGRAM?
WE NEED YOUR HELP (ONLY NEED 7 MINS OF YOUR TIME)
NEXT STEPS (1:20)
BONUS MATERIAL
Bonus Exam (Troubleshooting Only)
Security+ Master Class (76:11)
Getting A Cybersecurity Degree In 30 Mins (29:19)
ACCESS SERVICE MODELS
Lesson content locked
If you're already enrolled,
you'll need to login
.
Enroll in Course to Unlock