CompTIA Security+ (SY0-601)
Implementing, managing and maintaining IT security28 H 48 M
Just you? Training a whole team? There's an ITProTV plan that fits.
Start Training TodayThis course has a virtual lab
This course has a practice test
Episodes
Episodes
- Threats, Attacks, and Vulnerabilities
- Overview
- Social Engineering Techniques
- Malware
- Password Attacks - Types
- Password Attacks - Tools
- Application Attacks - Injections
- Application Attacks - System Resources
- Application Attacks - XSS and XSRF
- Application Attacks - Replay Attacks
- Network Attacks - DNS Attacks
- Network Attacks - Layer 2 Attacks
- Network Attacks - DoS and DDoS
- Network Attacks - MiTM and MiTB
- Network Attacks - Wireless
- Vulnerabilities
- Threat Intelligence - OSINT
- Threat Intelligence - Threat Maps and Feeds
- Threat Intelligence Vulnerability Databases Feed
- Threat Actors and Vectors
- Cryptography
- Cryptography Concepts
- Encryption and Steganography
- Hashing
- Secure Protocols
- Symmetric vs. Asymmetric Encryption
- PKI Concepts
- Certificates
- Keys
- IPSec
- Identity and Access Management
- Authentication and Authorization
- Authentication Methods
- Additional Authentication Methods
- Biometrics
- Authentication Protocols - PAP and CHAP
- Authentication Protocols - EAP and 802.1X
- Authentication Protocols - RADIUS and TACACS
- Authentication Protocols - Kerberos
- Access Control Schemes
- Account Management - Account Types
- Account Management - Password Policies
- Account Management - Account Policies
- Implementing Security
- Application Security
- Physical Security
- Wireless Security
- Secure Data Destruction
- Host Security - Endpoint Protection
- Host Security - Hardening
- Mobile Device Deployment
- Mobile Device Management and Enforcement
- Mobile Device Connections
- Specialized Systems
- Network Security - Segmentation
- Network Security - VPNs
- Network Security - Proxies and Load Balancing
- Network Security - Port Security
- Network Security - Firewalls
- Network Security - NIDS and NIPS
- Cloud and Virtualization
- Virtualization
- Cloud Concepts
- Cloud Services
- Cloud Models
- Computing Types
- Cloud Security Controls
- Operational Resiliency
- Hardware Redundancy
- Site Redundancy
- Non-persistence Concepts
- Backup and Recovery
- Operational Security and Incident Response
- Network Reconnaissance and Discovery
- Packet Capture and Replay
- Vulnerability Scans
- SIEM and SOAR Systems
- Pentesting Techniques
- Pentesting Exercise Types
- Digital Forensics Concepts
- Investigational Data Sources
- Incident Response Process
- Incident Response Plans
- Attack Frameworks
- Governance, Risk and Compliance
- Security Controls
- Regulations, Standards and Frameworks
- Spotlight on General Data Protection Regulation
- Organizational Security Policies - Personnel
- Organizational Security Policies - 3rd Party Risk
- Organizational Security Policies - Data
- Organizational Security Policies - Other Areas
- Risk Management Concepts - Vocabulary
- Risk Management Concepts - Types & Strategies
- Risk Management Concepts - Risk Analysis
- Risk Management Concepts Business Impact Analysis
- Privacy and Data Sensitivity - Breaches & Data Types
- Privacy, Data Sensitivity - Privacy Enhancing Tech
- Privacy, Data Sensitivity, Roles, Responsibilities
- Privacy and Data Sensitivity - Other Areas
Overview
5 M



- Episode Description
- Transcript
This series is focused on CompTIA’s Security+ certifications. Security+ is a vendor-neutral certification that is recognized worldwide as a benchmark for information system security best practices. The series is intended for aspiring IT security professionals entering into security. The series follows the CompTIA specified objectives for the SY0-601 exam