Autoplay
Autocomplete
Previous Lesson
Complete and Continue
CompTIA Security+ Certification SY701 | Complete Training
1-Course Introduction & Learning Goals
1-Security+ Certification Overview Your Path to Cybersecurity Mastery (4:51)
2-Security Foundations – Exam Objective Domain 1
2- Information Security vs. Cybersecurity Key Differences and Overlaps (10:53)
1- CIA Triad and Understand What is Security (7:34)
3- Essential Security Terminologies Threats, Risks, Vulnerabilities, and Exploits (7:31)
4- Exploring Security Vulnerabilities Types, Causes, and Impacts (5:15)
5- Identifying Threat Actors and Adversaries Profiles and Motivations (8:15)
6- Core Concepts in Vulnerabilities What Every Security Professional Must Know (4:50)
7- Deep Dive into the MITRE ATT&CK Framework Mapping Cyber Attacks (8:45)
8- Understanding the Attack Surface Minimizing Exposure to Threats (8:11)
9- Section Wrap-Up Key Takeaways from Security Foundations (5:48)
3-Security Threats – Exam Objective Domain 1
1-Deep Dive into Security Threats & Malware An Overview (12:56)
2-Effective Malware Countermeasures Strategies for Defense (8:46)
4-Exploring Man-in-the-Middle (MITM) & On-Path Attacks (9:26)
3-Understanding Cyber Attacks DoS & DDoS Explained (8:27)
5-Buffer Overflow Attacks Causes, Effects, and Defenses (5:57)
6-Web Application Attacks Techniques and Prevention (9:31)
7-Mobile Device Security Threats Risks of Rooting & Jailbreaking (6:18)
8-READING - Understanding Credential Replay Attacks Mechanisms and Mitigations
9-Privilege Escalation Explained Techniques and Prevention (6:44)
10-READING - Data Exfiltration Tactics How Attackers Steal Information
11-QUIZ - Security Threats & Malware Quiz 20 Questions Challenge
12-Section Wrap-Up Key Takeaways on Security Threats (5:23)
4-System Threats - Exam Objective Domain 1
1-READING - Hardware Vulnerabilities Understanding Risks in Physical Components
2-READING - Cryptographic Vulnerabilities Weaknesses in Encryption Systems
3-Virtual Machine Vulnerabilities Securing Virtualized Environments (8:57)
4-Cloud Security Vulnerabilities Identifying and Mitigating Risks (8:21)
5-READING - Mobile Device Vulnerabilities Challenges in a Mobile-First World
6-READING - Logic Bombs Explained Hidden Threats in Your Software
7-Race Conditions Understanding Timing Vulnerabilities (7:53)
8-QUIZ -Vulnerabilities & System Threats Quiz 20 Questions to Test Your Knowledge
9-Section Wrap-Up Key Takeaways on System Threats (3:58)
5-Cryptography - Exam Objective Domain 2
1-Introduction to Cryptography Securing Information in the Digital Age (8:32)
2-Key Cryptographic Concepts An Essential Guide (6:47)
3-Symmetric Encryption Fundamentals Fast & Efficient Data Protection (7:45)
4-Asymmetric Encryption Basics Public-Key Security Explained (7:35)
5-READING - Hybrid Cryptography Combining Symmetric and Asymmetric Methods
6-Hashing and Salting Techniques Protecting Data Integrity (9:48)
7-Understanding Rainbow Tables and Password Attacks (11:12)
8-Public Key Infrastructure (PKI) Building Trust in Digital Security (8:08)
9-Digital Certificates Authenticating Identity and Securing Communication (6:01)
10-Certificate Lifecycle Management Best Practices and Solutions (7:18)
11-Digital Signatures Ensuring Data Authenticity and Integrity (3:56)
12-Deep Dive into TLS and Mutual TLS (MTLS) (5:05)
13-Emerging Cryptography Concepts What’s Next in Digital Security (8:15)
14-READING - Blockchain Fundamentals for Security Professionals
15-Quantum Computing and Its Impact on Cryptography (6:58)
16-READING - End-to-End Encryption Securing Communications from Sender to Receiver
17-READING - Quantum-Safe Cryptography Preparing for the Future of Security
18-READING -Secure Enclaves Protecting Sensitive Data within Isolated Environments
19-READING - Cryptography on Mobile Devices Protecting Data in a Mobile World
20-QUIZ - Cryptography Quiz 40 Questions on Core Concepts and Applications
21-Section Wrap-Up Essential Cryptography Key Points (5:34)
6-Key Management - Exam Objective Domain 2
2-Tokenization & Data Security Techniques to Protect Sensitive Information (6:47)
1-Key Management Fundamentals Core Concepts for Secure Operations (6:21)
3-READING - Bring Your Own Key (BYOK) & Cloud Computing
4-READING - Key Escrow, Hardware Security Modules, and Key Encryption Keys
5-READING - Types of Hardware Security Modules Choosing the Right HSM
6-READING - Trusted Platform Module (TPM) Enhancing Hardware Security
7-QUIZ - Key Management Quiz 20 Questions on Tokenization and Security Modules
8-Section Wrap-Up Key Takeaways in Key Management (4:37)
7-Emerging IT Concepts and Infrastructure Services - Exam Objectives Domain 2,3
1-Cloud Computing Essentials Transforming IT Infrastructure (8:30)
10-DevOps Fundamentals Bridging Development and Operations (6:37)
11-DevSecOps Integrating Security into DevOps Practices (7:11)
13-Air-Gapping, In-Band, and Out-of-Band Networks Enhancing Network Security (7:36)
15-Section Wrap-Up Key Takeaways on Emerging IT Concepts (5:59)
2-Cloud Deployment Models Understanding Public, Private, and Hybrid Clouds (5:47)
3-Shared Responsibility Matrix Balancing Cloud Security (6:56)
4-Serverless, Grid Computing, and Virtual Desktop Infrastructure (VDI) (10:12)
5-Virtualization Explained Creating Efficient IT Environments (7:37)
6-Containerization Streamlining Application Deployment (7:37)
7-Software-Defined Networking (SDN) Redefining Network Control (7:58)
8-Network Function Virtualization (NFV) Optimizing Network Operations (10:19)
9-Infrastructure as Code Automating IT Infrastructure Management (6:26)
8-Governance of Security and Risk Management - Exam Objective Domain 5
1-What is Governance Understanding the Framework (7:13)
2-Security Governance Explained Building a Culture of Security (7:10)
3-Defining Security Roles Responsibilities and Best Practices (8:46)
4-Integrating Business and Security Aligning IT with Corporate Goals (6:21)
5-Security Standards and Regulations Navigating Compliance (12:12)
6-Conducting a Gap Analysis Identifying Areas for Improvement (7:27)
7-Introduction to Risk Management Strategies for Success (10:12)
8-Risk Terminologies Essential Vocabulary for Cybersecurity (6:50)
9-Risk Identification Finding and Categorizing Threats (6:48)
10-Risk Analysis Evaluating Threats and Vulnerabilities (8:52)
11-Risk Evaluation and Response Prioritizing and Mitigating Risks (12:43)
12-Risk Monitoring, Reporting, and Documentation Staying Ahead of Threats (9:23)
13-QUIZ - Governance and Risk Management Quiz 40 Questions
14-Section Wrap-Up Key Points on Governance and Security Risk Management (5:33)
9-Security Controls - Exam Objectives Domain 2,3
1-Understanding Security Controls Types and Applications (12:37)
2-Real-World Examples of Security Controls How They Work (6:50)
3-Control Objectives Setting Clear Security Targets (7:23)
4-Layered Defenses Building a Multi-Tiered Security Strategy (8:10)
5-Implementing and Aquiring New Security Controls Best Practices (6:05)
6-Evaluating Security Controls Techniques and Metrics (5:42)
7-KPIs, KCIs, KGIs – Measuring Security Performance (5:34)
8-READING - Network Segmentation Enhancing Network Security
9-READING - Network Security Controls Policies and Best Practices
10-READING - IDS & IPS Monitoring and Preventing Intrusions
11-Using Sandboxes Isolating and Testing Suspicious Code (3:54)
12-Web Application Firewalls Protecting Online Applications (5:21)
13-READING - Proxy Servers and Content Filters Controlling Web Traffic
14-READING - Dot1x Authentication and Network Access Control (NAC)
15-READING - Network Security Recap Establishing a Baseline
16-QUIZ - Security Controls, Metrics, and Network Security - 40q
17-READING - Virtual Private Networks (VPN) Securing Remote Access
18-Internet, Email & Remote Access Policies Best Practices (7:07)
19-READING - Wireless Security Essentials Protecting Mobile Networks
20-Network Security Guidelines Strategies for Effective Protection (7:30)
21-Backup and Recovery Ensuring Data Continuity (10:47)
22-Server and Software Security, and Backup Policies (6:53)
23-Designing Secure Network Architectures (6:07)
24-QUIZ - Network Security, VPNs, and Backup Policies Quiz 40 Questions
25-Section Wrap-Up Key Takeaways on Security Controls (5:47)
10-Endpoint Security and Securing End User Devices
1-Best Practices for Endpoint Security Protecting Your Devices (6:31)
2-Endpoint Protection Platforms Overview & Essential Tools (12:27)
3-Information Rights Management & Digital Rights Management (8:13)
4-DRM Best Practices Safeguarding Digital Media and Sensitive Files (8:09)
5-Data Leakage Prevention Stopping Sensitive Data Loss (7:37)
6-System Hardening Techniques Strengthening Your IT Environment (10:02)
7-Mobile Device Hardening Securing Smartphones and Tablets (9:55)
8-READING - Application Security Hardening Protecting Software from Threats
9-Section Wrap up, Endpoint Security Recap Key Points to Remember (4:48)
11-Identity Access Management - Exam Objectives Domain 2,3,5
1-Understanding Identity and Access Management (IAM) Core Functions (8:46)
2-Identification, Authentication, Authorization, and Accounting (IAAA) (13:49)
3-Biometrics and Multi-Factor Authentication Enhancing Access Security (8:57)
4-Single Sign-On (SSO) & Related Solutions Streamlining Access (7:44)
5-Authorization Essentials Managing Access Rights (7:47)
6-Accounting, Audit Trails, and SIEM Solutions in IAM (8:27)
7-User Account Provisioning and Access Policies Best Practices (7:55)
8-QUIZ - IAM and Access Control Quiz 20 Questions
9-Section Wrap-Up Key Takeaways on Identity and Access Management (5:12)
12-Data Security - Exam Objectives Domain 2,3
1-Data & Assets Lifecycle From Creation to Destruction (3:45)
2-Asset Management Protecting Your Critical Resources (6:51)
3-Intellectual Property Protection Securing Your Innovations (3:24)
4-Data Classification Organizing Sensitive Information (12:12)
5-Data Protection & Classification Policies Implementing Security Best Practices (8:19)
6-Data Privacy & Privacy Protection Measures Ensuring Confidentiality (11:01)
7-Data Security - Exam Objectives Domain 2,3
8-Section Wrap-Up Key Takeaways on Data Security (4:26)
13-IT Security Management - Exam Objectives Domain 2,3,4,5
1-IT Functions & Management Understanding ITIL Framework (8:40)
2-Shadow IT Identifying and Managing Unauthorized Systems (4:30)
3-Configuration Management & Baseline Configurations Best Practices (7:15)
4-Change Management Process Streamlining IT Updates (11:05)
5-Capacity & Financial Planning Aligning IT with Business Needs (6:43)
6-Capital Expenditure vs. Operational Expenditure and ROIROSI Fundamentals (7:35)
7-QUIZ - IT Management & Planning Quiz 20 Questions
8-Section Wrap-Up Key Takeaways on IT Security Management (4:42)
14-Personnel Security & Vendor Management - Exam Objectives Domain 4,5
1-The Role of HR & Personnel Security Measures Protecting Your Organization (11:11)
2-Social Engineering Attacks Prevention and Response (10:02)
3-Security Awareness Training Programs Building a Culture of Security (4:55)
4-Vendor Management & Outsourcing Securing Third-Party Relationships (14:04)
5-Supply Chain Attacks & Third-Party Assessments Minimizing Risk (9:47)
6-Digital Risk Protection, Social Media Monitoring & Dark Web Analysis (8:30)
7-Physical Security & Access Control Protecting Assets and Facilities (8:49)
8-Securing Power Sources, Environmental Controls & Fire Suppression Systems (12:16)
9-Designing a Secure Physical Data Center (5:21)
10-QUIZ - Personnel Security, Social Engineering & Physical Security 20 Questions
11-Section Wrap-Up Key Takeaways on Personnel Security & Vendor Management (5:22)
15-Incident Management and Continues Monitoring - Exam Objectives Domain 4
1-Incident Management Overview Frameworks and Best Practices (9:17)
2-Developing an Incident Response Plan Steps and Strategies (13:58)
3-Forensic Evidence Acquisition & Lifecycle A Practical Guide (7:50)
4-READING - Deep Dive into Digital Forensics Techniques and Tools
5-Log Management & Operational Logging Monitoring for Incidents (9:46)
6-Inside the Security Operations Center (SOC) Roles and Responsibilities (10:23)
7-SIEM Architecture & Monitoring Protocols Real-Time Security Analysis (12:31)
8-Threat Intelligence & Collaboration with CERT Proactive Security Measures (5:58)
9-EDR, NDR, XDR & SOAR Next-Generation Endpoint and Network Detection (9:32)
10-File Integrity Monitoring (FIM) Protecting Against Unauthorized Changes (7:13)
11-READING - Automation and Orchestration in Incident Response Boosting Efficiency
12-READING - Identifying Attack Indicators Early Warning Signs of Breaches
13-Penetration Testing Simulating Attacks to Uncover Vulnerabilities (10:06)
14-Application Security Testing Finding Flaws Before Hackers Do (9:18)
15-Bug Bounty Programs Crowdsourcing Security Research (5:23)
16-Auditing and Audit Objectives Measuring Security Performance (7:00)
17-Internal and External Auditing Best Practices for Compliance (6:07)
18-QUIZ - Incident Response, Forensics, SOC, and Auditing 40 Questions
19-Section Wrap-Up Key Takeaways on Incident Management & Monitoring (6:13)
16-Continuity of Business Operations - Exam Objectives Domain 4
2-Disaster Recovery Plan (DRP) Strategies for Quick Restoration (9:33)
1-Disaster Scenarios & Business Impact Analysis Assessing Critical Functions (9:17)
3-Business Continuity Planning (BCP) Ensuring Operational Resilience (11:20)
4-Developing a BCP Policy Framework and Guidelines (8:59)
5-Recovery Sites & Alternate Processing Facilities Options for Resilience (11:01)
6-Network Redundancy Designing Fail-Safe Infrastructures (9:38)
7-QUIZ - Disaster Recovery, Business Continuity & Network Redundancy 40 Questions
8-Section Wrap-Up Key Takeaways on Business Operations Continuity (4:21)
17-Exam Prep. Questions - Use it to prepare to the Mock Exam and Final Test!
1-EXAM - Domain 1 - Attacks, Threats, and Vulnerabilities (24 Questions)
2-EXAM - Domain 2 Architecture and Design (21 Questions)
3-EXAM - Domain 3 Implementation (25 Questions)
4-EXAM - Domain 4 Operations and Incident Response (16 Questions)
5-EXAM - Domain 5 Governance, Risk, and Compliance (14 Questions)
18-Domain 1 Recap and Quick Review - Key Points and Summary for Last Minute!
1-Introduction to the CIA Triad, DAD Threats, and Security Principles (8:59)
2-Controls and Countermeasures – Administrative, Technical, Physical (8:58)
3-Security Roles, Responsibilities, and Risk Concepts (9:40)
19-Domain 2 Recap and Quick Review - Key Points and Summary for Last Minute!
2-Social Engineering, Physical Attacks, and Insider Threats (9:47)
1-Common Threat Types – Malware, Phishing, Social Engineering, and Insider Threats (10:05)
3-Vulnerability Management and Threat Modeling (9:15)
4-Penetration Testing, Vulnerability Scanning, and Reporting (8:50)
5-Mitigation Strategies – Endpoint, Network, and Application (8:28)
20-Domain 3 Recap and Quick Review - Key Points and Summary for Last Minute!
1-Secure Network Design – Segmentation, DMZs, VLANs (8:00)
2-Virtualization, Cloud Security Models, and Shared Responsibility (8:11)
3-Secure Protocols, Wireless Protection, IoT, and Zero Trust (8:06)
4-Cryptographic Concepts – Encryption, Hashing, PKI, and Certificates (11:24)
5-Identity and Access Management (IAM) (11:25)
6-Physical Security and Environmental Controls (10:39)
7-Secure Development Practices & Application Security (12:29)
21-Domain 4 Recap and Quick Review - Key Points and Summary for Last Minute!
2-Logging, Monitoring, SIEM, and Alert Management (7:44)
1-Incident Response Lifecycle, Roles, and Documentation (8:03)
3-Forensics, Evidence Handling, and Chain of Custody (8:11)
4-Patching, Change Control, Configuration Management (8:07)
5-Security Tools – EDR, SOAR, Vulnerability Scanners (8:30)
6-Security Implications of Embedded and Specialized Systems (11:20)
7-Wireless Security Deep Dive (11:05)
22-Domain 5 Recap and Quick Review - Key Points and Summary for Last Minute!
2-Security Policies, Awareness, Training, and Roles (7:58)
1-Governance, Risk Management, and Compliance Frameworks (8:07)
3-Best Practices in Policies Creation and Development (6:47)
4-Auditing, Third-Party Risk, Ethics, and Legal Requirements (9:09)
23-Exam Strategy and Preparation
1-How to Prepare Effectively for the CompTIA Security+ Exam (7:11)
2-Common Exam Pitfalls and How to Overcome Them (7:54)
3-Question Answering Techniques, Mindset, and Time Management (8:22)
24-Preparing for Your Cybersecurity Interview - ADD ON SECTION TO SUPPORT YOU!
1-Navigating the Cybersecurity Landscape – Trends, Challenges & Opportunities (7:18)
2-Mastering Cybersecurity Interviews – Your Comprehensive Preparation Guide (7:34)
3-Crafting a Winning Resume for a Cybersecurity Career (7:27)
4-Excelling in Technical & HR Cybersecurity Interviews (11:06)
5-Post-Interview Success – Next Steps for Your Cybersecurity Career (10:43)
6-Building a Powerful Personal Brand in Cybersecurity (8:02)
7-Mastering Professional Networking for Career Success in Cybersecurity (13:07)
4-Layered Defenses Building a Multi-Tiered Security Strategy
Lesson content locked
If you're already enrolled,
you'll need to login
.
Enroll in Course to Unlock