CompTIA Security+ SY0-601 certification course Free. This will be live for a limited time. It's all free, but it is a huge help if you like and share this video.
#security #comptia_security
Video training course. All labs are at the end. Links to all the other material are below:
Security+ Workbook - https://www.howtonetwork.com/free-security-workbook
Exam 1 - https://www.howtonetwork.com/free/free-security-practice-test/
Exam 2 - https://www.howtonetwork.com/free/free-security-exam/
Exam 3 - https://www.howtonetwork.com/free/security-practice-exam-free/
101 Security+ Labs Free - https://www.101labs.net/comptia-security/
Buy 101 Labs - CompTIA Security+ on Amazon - https://amzn.to/3gPb2Y2
Module 1 - Attacks, Threats, and Vulnerabilities
0:00:00 – Social Engineering Techniques
0:27:36 – Types of Attacks
0:51:21 – Application Attacks
1:15:59 – Network Attacks
1:41:00 – Threat Actors, Vectors, and Intelligent Sources
2:02:35 – Vulnerabilities
2:15:41 – Security Assessment Techniques
2:32:34 – Penetration Testing Techniques
Module 2 - Architecture and Design
2:51:57 – Configuration Management
2:59:56 – Data Confidentiality - Data Loss Prevention
3:04:37 – Data Confidentiality - Cloud Access Security Brokers
3:07:56 – Data Confidentiality - Encryption and Data Obfuscations
3:14:53 – Data Confidentiality - Rights Management
3:18:49 – Data Confidentiality - Hardware Security Module and Encrypted Traffic Management
3:22:44 – Data Confidentiality - Data Integrity and Data Availability
3:27:53 – Data Confidentiality - Site Resiliency and Geographic Considerations
3:33:54 – Deception and Disruption
3:40:07 – Virtualization & Cloud Computing - Hypervisors, Containers, SDN
3:59:58 – Virtualization & Cloud Computing - On_Premises vs Off-Premises
4:06:01 – Virtualization & Cloud Computing - Cloud Models
4:25:02 – Secure Application Development, Deployment, and Automation
4:49:58 – Secure Application Development, Deployment, and Automation 2
5:06:19 – Authentication and Authorization
5:30:44 – Cybersecurity Resilience
5:57:53 – Security Implications of Embedded and Specialized Systems
6:20:29 – Physical Security Controls
6:49:11 – Cryptography
Module 3 - Implementation
7:06:50 – Secure Protocols
7:29:33 – Host and Application Security Solutions
7:57:42 – Secure Network Design
8:18:28 – Wireless Security Settings
8:38:48 – Secure Mobile Solutions
9:06:02 – Cloud Cybersecurity Solutions
9:26:45 – Identify and Account Management Controls
9:48:37 – Authentication and Authorization Solutions
10:11:25 – Public Key Infrastructure
Module 4 - Operations and Incident Response
10:36:31 – Organizational Security
10:53:45 – Incident Response
11:15:51 – Incident Investigation
11:32:53 – Incident Mitigation
11:48:53 – Digital Forensics
Module 5 - Governance, Risk, and Compliance
12:09:51 – Control Categories and Types
12:21:03 – Regulations, Standards, and Frameworks
12:32:20 – Organizational Security Policies
12:53:47 – Risk Management
13:21:26 – Sensitive Data and Privacy
Module 6 - Labs
13:37:44 – Cisco Packet Tracer Tour
14:01:42 – Lab 1 - Implementing Common Network Services
14:33:02 – Lab 2 - Enable Local and Server-Based AAA Authentication
14:55:13 – Lab 3 - Implement IPSEC Site-to-Site VPN
15:13:53 – Lab 4 - Configure Firewall Settings
15:54:15 – Lab 5 - Preparation (VMware Workstation, Windows, and Kali Linux VM installation)
16:06:44 – Lab 6 - Cyber Attack Lab - Force High CPU and Memory on a Windows Machine
16:14:32 – Lab 7 - Cyber Attack - Creating Standalone Payloads in Kali Linux
16:31:40 – Lab 8 - Social Engineering - Performing Reconnaissance