Linux Academy – – Comptia Security Plus Certification Prep-BiFiSO
English | Size: 5.74 GB
Category: Tutorial
This course is designed to prepare prospective students for the Security+ Certification Exam. In this course, we will cover the domains of the Security+ Certification Exam:
Threats, Attacks, and Vulnerabilities Technologies and Tools Architecture and Design Identity and Access Management Risk Management Cryptography and PKI
After taking this course, the student will feel confident in their abilities to undertake the certification exam.
Syllabus
Introduction
Introduction
About the Author
00:00:28
About the Course
00:02:15
About the Exam
00:03:42
1. Threats, Attacks and Vulnerabilities
1.1. Indicators of Compromise and Malware
Understanding IOCs
00:10:46
Types of Malware
00:12:59
1.2 Compare and Contrast Types of Attacks
Social Engineering Attacks
00:05:12
Technical Attacks
00:12:07
Wireless and Cryptographic Attacks
00:12:02
1.3 Threat Actors
Threat Actor Types and Attributes
00:10:12
1.4 Penetration Testing
Pentesting Concepts
00:08:02
1.5 Vulnerability Scanning
Explain concepts of vulnerability scanning
00:07:32
1.6 Impact of Vulnerabilities
Discuss the Impact of Vulnerability Types
00:16:33
Threats, Attacks, and Vulnerabilities
00:45:00
2. Technologies and Tools
2.1 Installation and configuration of network security devices
Firewalls
00:10:35
IDS/IPS
00:14:12
Router and Switch Security
00:05:36
Proxies and Load balancers
00:06:57
Other Network Components
00:14:28
Hands-on Labs are real live environments that put you in a real scenario to practice what you have learned without any other extra charge or account to manage.
Blocking and Allowing Traffic with a Firewall
01:00:00
2.2 Assessing Security Posture of an Organization
Tool Overview
00:15:51
Command Line Tools
00:10:09
Hands-on Labs are real live environments that put you in a real scenario to practice what you have learned without any other extra charge or account to manage.
Utilize TCPDump for Packet Capture
01:00:00
2.3. Troubleshooting Common Security Issues
Common Security Issues and their Impact
00:17:43
2.4. Securely deploying mobile devices
Connection Methodologies Defined
00:11:18
Mobile Device Management Principles
00:10:51
Monitoring and Enforcing Mobile methodologies
00:18:18
2.5. Implementing Secure Protocols
Secure Protocols Overview Part 1
00:09:27
Secure Protocols Overview Part 2
00:08:38
Technologies and Tools
01:00:00
3. Architecture and Design
3.1. Frameworks, Best Practices, and Secure Configuration Guides
Frameworks Overview
00:08:10
3.2. Secure Network Architecture Concepts
Discussing the Concepts That Will Help Secure Your Network
00:09:47
3.3. Secure System Design
Hardware Security
00:07:54
Operating Systems
00:09:46
3.4. Secure Staging Deployment Concepts
Staging Environments and Security Implications
00:04:56
3.5. Embedded Systems
Security Implications of Embedded Systems
00:13:58
3.6. Secure Application Development
Development Lifecycle Models
00:07:14
Secure DevOps
00:08:25
Secure Coding Techniques and Best Practices
00:14:38
Code Quality and Testing
00:05:26
3.7. Cloud and Virtualization Concepts
Virtualization Concepts
00:05:35
Cloud Concepts
00:07:02
3.8. Reducing risks through resiliency and automation
Resiliency and Automation
00:08:00
Redundancy and High Availability
00:05:20
3.9. Physical Controls
Physical Controls
00:12:27
Architecture and Design
01:15:00
4. Identity and Access Management
4.1. Identity and access management concepts
Identification, Authentication, Authorization, and Accounting (AAA)
00:07:37
4.4. Common Account Management Practices
Account Management
00:12:19
Account Policy Enforcement
00:08:57
4.2. Installation and Configuration of Identity and Access Services
Define Different Identity and Access Service Types
00:08:02
Identity and Access Services Part 2
00:05:23
4.3. Identity and Access Management Controls
Identity and Access Management Controls
00:08:16
Identity and Access Management
00:30:00
5.0. Risk Management
5.1. Organizational Security Policies, Plans and Policies
Personnel Management
00:09:46
Agreement Types
00:07:32
5.2. Concepts from a Business Impact Analysis
Business Impact Analysis
00:12:25
5.3. Risk Management Processes and Concepts
Risk Management
00:07:24
5.4. Incident Response
Incident Response Concepts
00:09:48
5.5. Digital Forensics
Digital Forensics
00:04:56
5.6. Disaster Recovery and Continuity of Operations
Disaster Recovery and Continuity of Operations
00:09:15
Hands-on Labs are real live environments that put you in a real scenario to practice what you have learned without any other extra charge or account to manage.
Backup and Recovery
01:00:00
5.7. Control Types
Differentiating Between Control Types
00:04:58
5.8. Data Security and Privacy Practices
Data Security and Privacy Practices
00:08:06
Risk Management
00:45:00
6. Cryptography and PKI
6.1. Basic Concepts of Cryptography
Basic Concepts of Cryptography (Part 1)
00:10:34
Basic Concepts of Cryptography (Part 2)
00:06:14
Hands-on Labs are real live environments that put you in a real scenario to practice what you have learned without any other extra charge or account to manage.
Generating and Exchanging SSH Keys Between Servers
01:00:00
6.2. Basic Characteristics of Cryptographic Algorithms
Symmetric Algorithms
00:08:00
Asymmetric Algorithms
00:02:37
Hashing Algorithms
00:04:59
6.3. Wireless Security Settings
Wireless Cryptography
00:08:33
6.4. Public Key Infrastructure (PKI)
PKI Overview
00:06:34
Types of Certificates
00:07:14
Concepts
00:04:20
Cryptography and PKI
01:15:00
Practice Exam
Security+ Prep Course Practice Exam
01:00:00
Course Features
Our platform enhances courses beyond just videos with unique features. Learn more.
Certification Prep Course
This course can help prepare you for a certification exam.
Earn a Certificate of Completion
When you complete this course, you’ll receive a certificate of completion as proof of your accomplishment.
Take this course and learn a new skill today.
Password Unlock tut4dl
[passster password=”tut4dl”]
DOWNLOAD:
rapidgator.net/file/29d11c25c93b9d63630a61e213c318ed/LA.COMPTIA.SECURITY.PLUS.CERTIFICATION.PREP.28.7.part01.rar.html
rapidgator.net/file/bdbfdf1485be77406dfe31daa263e1a5/LA.COMPTIA.SECURITY.PLUS.CERTIFICATION.PREP.28.7.part02.rar.html
rapidgator.net/file/985b9a272b025301aaa4a6cfe413c275/LA.COMPTIA.SECURITY.PLUS.CERTIFICATION.PREP.28.7.part03.rar.html
rapidgator.net/file/93f150357838d37652cad6a97846b32a/LA.COMPTIA.SECURITY.PLUS.CERTIFICATION.PREP.28.7.part04.rar.html
rapidgator.net/file/cf678c25b5f7b1f99665c29b4d1eb2eb/LA.COMPTIA.SECURITY.PLUS.CERTIFICATION.PREP.28.7.part05.rar.html
rapidgator.net/file/537f80429a2fabf9a123525672e73829/LA.COMPTIA.SECURITY.PLUS.CERTIFICATION.PREP.28.7.part06.rar.html
rapidgator.net/file/3f9150e97ddd6eb849192bb6ac5109ad/LA.COMPTIA.SECURITY.PLUS.CERTIFICATION.PREP.28.7.part07.rar.html
rapidgator.net/file/b880f1385898752245dfcae4812bc732/LA.COMPTIA.SECURITY.PLUS.CERTIFICATION.PREP.28.7.part08.rar.html
rapidgator.net/file/6878251090a645f92ac0c8b3a1951f17/LA.COMPTIA.SECURITY.PLUS.CERTIFICATION.PREP.28.7.part09.rar.html
rapidgator.net/file/a8afe7c84849a73ad7694d61b3500bdc/LA.COMPTIA.SECURITY.PLUS.CERTIFICATION.PREP.28.7.part10.rar.html
rapidgator.net/file/fbdaa8dc4672f644d8a3f5891a00628b/LA.COMPTIA.SECURITY.PLUS.CERTIFICATION.PREP.28.7.part11.rar.html
rapidgator.net/file/3cde001952f752946936fffbbcc39f88/LA.COMPTIA.SECURITY.PLUS.CERTIFICATION.PREP.28.7.part12.rar.html
rapidgator.net/file/abd1fca1f390bca5f9d36b9c26bd9878/LA.COMPTIA.SECURITY.PLUS.CERTIFICATION.PREP.28.7.part13.rar.html
nitroflare.com/view/E87EE27AEEF179B/LA.COMPTIA.SECURITY.PLUS.CERTIFICATION.PREP.28.7.part01.rar
nitroflare.com/view/3857571B4B3C10D/LA.COMPTIA.SECURITY.PLUS.CERTIFICATION.PREP.28.7.part02.rar
nitroflare.com/view/0C5C46EF54D7CA0/LA.COMPTIA.SECURITY.PLUS.CERTIFICATION.PREP.28.7.part03.rar
nitroflare.com/view/CF59BE6E3679377/LA.COMPTIA.SECURITY.PLUS.CERTIFICATION.PREP.28.7.part04.rar
nitroflare.com/view/E60E0A4397F6A79/LA.COMPTIA.SECURITY.PLUS.CERTIFICATION.PREP.28.7.part05.rar
nitroflare.com/view/DB2FC15B95FAB2D/LA.COMPTIA.SECURITY.PLUS.CERTIFICATION.PREP.28.7.part06.rar
nitroflare.com/view/B4661F820CC73ED/LA.COMPTIA.SECURITY.PLUS.CERTIFICATION.PREP.28.7.part07.rar
nitroflare.com/view/9F948F290383710/LA.COMPTIA.SECURITY.PLUS.CERTIFICATION.PREP.28.7.part08.rar
nitroflare.com/view/EEF8DC2F9923A5D/LA.COMPTIA.SECURITY.PLUS.CERTIFICATION.PREP.28.7.part09.rar
nitroflare.com/view/766AD623D14D109/LA.COMPTIA.SECURITY.PLUS.CERTIFICATION.PREP.28.7.part10.rar
nitroflare.com/view/11E3E83173E9420/LA.COMPTIA.SECURITY.PLUS.CERTIFICATION.PREP.28.7.part11.rar
nitroflare.com/view/000C2051F56950B/LA.COMPTIA.SECURITY.PLUS.CERTIFICATION.PREP.28.7.part12.rar
nitroflare.com/view/04C5B79E3424033/LA.COMPTIA.SECURITY.PLUS.CERTIFICATION.PREP.28.7.part13.rar
[/passster]