Home Search Profile

Master CompTIA Security+ SY0-701: Ultimate Cyber Defense 2024

Focused View

13:03:51

  • 1. Welcome to Security Control Categories and Types.mp4
    00:56
  • 2. Security Controls Overview.mp4
    09:14
  • 3. Security Control Category Technical Controls.mp4
    11:48
  • 4. Security Control Category Managerial Controls.mp4
    05:57
  • 5. Security Control Category Operational Controls.mp4
    03:55
  • 6. Security Control Category Physical Controls.mp4
    04:25
  • 7. Validation.mp4
    02:27
  • 8. Part 2.mp4
    10:11
  • 1. Intro to summarize Security Concepts.mp4
    00:21
  • 2. CIA.mp4
    23:34
  • 3. Non-repudiation.mp4
    03:48
  • 4. AAA.mp4
    08:33
  • 5. Zero-Trust and Gap Analysis.mp4
    11:11
  • 6. Physical Security.mp4
    04:42
  • 7. Physical Security.mp4
    10:20
  • 8. Validation of Security Concepts.mp4
    02:12
  • 9. Validation of Security Concepts part 2.mp4
    04:03
  • 1. Intro to Change Management.mp4
    00:37
  • 2. Change Management Overview.mp4
    07:29
  • 3. Business Processes Impacting Security Operation.mp4
    11:23
  • 4. Technical Implications and Documentation.mp4
    13:40
  • 5. Practical Example for Change Control.mp4
    10:54
  • 6. Validation of Change Control with Security.mp4
    02:10
  • 7. Validation of Change Control with Security Part 2.mp4
    03:16
  • 1. Intro to Using Symmetrical Encryption.mp4
    00:45
  • 2. Symmetric Encryption Overview.mp4
    11:02
  • 3. Algorithm and Key Examples.mp4
    06:14
  • 4. Data at Rest Encryption Example.mp4
    07:05
  • 5. Data in Motion Encryption Examples with IPsec.mp4
    14:16
  • 6. Establishing a Shared Key.mp4
    08:35
  • 7. Reinforce and Validate.mp4
    01:46
  • 8. Reinforce and Validate Part 2.mp4
    03:24
  • 1. Intro to Asymmetrical Encryption.mp4
    00:24
  • 2. Asymmetrical Encryption Overview.mp4
    15:34
  • 3. Delivering Public Keys Using Digital Certificates.mp4
    04:43
  • 4. Using Digital Signatures.mp4
    10:38
  • 5. Using a Public Key to Encrypt.mp4
    06:46
  • 6. Using a Public Key to Encrypt.mp4
    10:03
  • 7. Validation.mp4
    01:41
  • 8. Validation Part 2.mp4
    05:31
  • 1. Intro to PKI and Certificates.mp4
    00:35
  • 2. PKI and Certs Overview.mp4
    17:33
  • 3. Self Signed Certs.mp4
    04:47
  • 4. Adding an Internal CA to as a Trusted CA.mp4
    13:05
  • 5. Using a CSR for Requesting a Certificate.mp4
    12:31
  • 6. Reinforce and Validate What We Have Learned.mp4
    00:54
  • 7. Reinforce and Validate What We Have Learned Part 2.mp4
    03:44
  • 1. Intro to Cryptography Tools and Methods.mp4
    00:12
  • 2. Cryptography Tools and Methods Overview.mp4
    18:20
  • 3. Security Modules.mp4
    11:08
  • 4. Obfuscation.mp4
    09:18
  • 5. Salting and Key Stretching.mp4
    05:31
  • 6. Open Public Ledger.mp4
    11:10
  • 7. Validation.mp4
    01:05
  • 8. Validation Part 2.mp4
    04:16
  • 1. Lets compare common themes in cybersecurity threats.mp4
    01:20
  • 2. Who are the attackers.mp4
    07:20
  • 3. What information do we use to classify threats.mp4
    08:15
  • 4. Where do we gain information on target systems.mp4
    05:42
  • 5. Where do we gain information on target systems Part 2.mp4
    07:10
  • 6. With all this information, what do we do with it.mp4
    05:34
  • 7. Challenge.mp4
    01:49
  • 8. Solution.mp4
    05:09
  • 1. Threat vectors.mp4
    05:29
  • 2. Threat indicators tell us more about threat vectors.mp4
    12:35
  • 3. Whos behind all this.mp4
    09:41
  • 4. ishing a subcategory.mp4
    06:07
  • 5. ishing a subcategory Part 2.mp4
    04:55
  • 6. Password Attacks.mp4
    06:27
  • 7. Challenge.mp4
    01:24
  • 8. Solution.mp4
    02:36
  • 1. The Attack Vector.mp4
    02:29
  • 2. Injection Attacks.mp4
    12:53
  • 3. Authentication Vulnerabilities.mp4
    09:43
  • 4. Session Attacks.mp4
    09:30
  • 5. Authentication Vulnerabilities.mp4
    02:58
  • 6. Authorization Vulnerabilities.mp4
    05:21
  • 7. Cross-Site Scripting - XSS.mp4
    01:45
  • 8. Memory Management.mp4
    04:38
  • 9. Challenge.mp4
    01:26
  • 10. Solution.mp4
    02:17
  • 1. Indicators of Malicious Activity.mp4
    00:48
  • 2. Social Engineering Indicators.mp4
    03:05
  • 3. Network Indicators.mp4
    08:34
  • 4. System Indications.mp4
    05:55
  • 5. Access Indicators.mp4
    07:25
  • 6. Pathways for malicious activity.mp4
    07:02
  • 7. Challenge.mp4
    01:42
  • 8. Solution.mp4
    08:03
  • 1. Identifying those indicators.mp4
    01:43
  • 2. Social Engineering Remedies.mp4
    08:34
  • 3. Network Remedies.mp4
    10:28
  • 4. System Remedies.mp4
    10:20
  • 5. Access Remedies.mp4
    08:49
  • 6. Challenge.mp4
    00:39
  • 7. Solution.mp4
    04:11
  • 1. Software Development Life Cycle - SDLC.mp4
    10:42
  • 2. Software Development Life Cycle - SDLC Part 2.mp4
    01:56
  • 3. Software Testing.mp4
    12:00
  • 4. Security Testing.mp4
    07:23
  • 5. Application Security Controls.mp4
    06:36
  • 6. Challenge.mp4
    00:27
  • 7. Solution.mp4
    05:57
  • 1. Introducing IDS and IPS.mp4
    01:53
  • 2. Lets start by understanding what IDS and IPS is..mp4
    02:39
  • 3. Understanding Rules.mp4
    06:16
  • 4. IDS and IPS Placement.mp4
    09:15
  • 5. Bringing all of them together.mp4
    01:41
  • 6. What is a SOAR.mp4
    03:53
  • 7. What is a SIEM.mp4
    04:40
  • 8. Challenge.mp4
    04:20
  • 9. Solution.mp4
    06:11
  • 1. Introduction.mp4
    00:40
  • 2. Overview.mp4
    04:39
  • 3. Cloud Architectures.mp4
    19:19
  • 4. Application Architectures.mp4
    09:08
  • 5. Network Architectures.mp4
    22:20
  • 6. Segmentation Example.mp4
    09:44
  • 7. Validation.mp4
    02:16
  • 8. Solution.mp4
    08:23
  • More details


    Course Overview

    This comprehensive Security+ certification course prepares you for the SY0-701 exam while equipping you with essential cybersecurity skills to protect organizations from modern threats.

    What You'll Learn

    • Implement security controls across technical, operational and physical domains
    • Master encryption methods including symmetric, asymmetric and PKI systems
    • Identify threats, vulnerabilities and implement effective mitigation strategies

    Who This Is For

    • Aspiring cybersecurity professionals seeking Security+ certification
    • IT administrators transitioning to security roles
    • Network engineers expanding their security knowledge

    Key Benefits

    • Hands-on practice with encryption tools and security implementations
    • Real-world threat analysis and defense techniques
    • Preparation for one of IT's most valuable security certifications

    Curriculum Highlights

    1. Security Controls & CIA Fundamentals
    2. Cryptography & PKI Mastery
    3. Threat Analysis & Mitigation Strategies
    Focused display
    • language english
    • Training sessions 120
    • duration 13:03:51
    • Release Date 2025/05/21

    Courses related to CompTIA Security+

    Subtitles
    Master Advanced Security Operations for CompTIA SecurityX
    Subtitles
    Master Secure Network Architecture for CompTIA SecurityX Pro
    Subtitles
    Master Secure Network Implementation: CompTIA SecurityX Pro

    Courses related to Network Security