TOTAL: CompTIA Security+ Certification Course + Exam SY0-701

TOTAL: CompTIA Security+ Certification Course + Exam SY0-701

English | MP4 | AVC 1920×1080 | AAC 44KHz 2ch | 182 lectures (20h 18m) | 20.55 GB

Everything you need to pass the CompTIA Security+ (SY0-701) exam from Mike Meyers, Dan Lachance, and Lyndon Williams!

The new CompTIA Security+ exam launched November 8th, 2023. Prep for your studies with our new video course covering all the updated objectives that were changed for the SY0-701 exam.

Welcome to the TOTAL: CompTIA Security+ Certification (SY0-701), a course from the production studios of Total Seminars with subject matter experts Mike Meyers, Dan Lachance, and Lyndon Williams.

This course covers everything you need to know to pass your CompTIA Security+ (SY0-701) certification exam, include a practice exam. This course will ensure you have the knowledge and skills to be a great entry-level cybersecurity tech AND help make sure you are ready to pass the CompTIA Security+ exam. Mike Meyers is well known as the “Alpha Geek.” Mike is widely known as the #1 CompTIA author and instructor with over 1 million books in print. Dan Lachance is a highly motivated and passionate IT evangelist. He is a consultant, trainer, and author with over 20 years of experience in the IT security industry. Lyndon Williams creates innovative cybersecurity solutions with Cisco, Palo Alto, and Juniper platforms to provide business acceleration and produce intelligent, resilient automated response and remediation systems. He is also an instructor for CyberNow Labs, teaching students the necessary skills to start their journey toward becoming Cybersecurity Analysts.

This course shows you how to:

  • Apply the three “A’s” of security: authentication, authorization, and accounting
  • Scan your wired or wireless network and assess it for various weaknesses
  • Use cryptography to assure integrity of data through hashing and confidentiality of data through symmetric/asymmetric cryptosystems and public key infrastructure (PKI)
  • Understand critical concepts in risk management, like setting up alerts, responding to incidents, and mitigating vulnerabilities
  • Identify how hackers are trying to get into your network, IT infrastructure, and physical assets and how security techs help prevent those breaches
  • Prevent attacks ranging from simple malware to sophisticated exploits to social engineering that take advantage of people’s trust, relationships, and lack of knowledge
  • Secure an enterprise environment, including creating incident response reports and disaster recovery plans as well as establishing business continuity

What you’ll learn

  • This is a complete and comprehensive CompTIA Security+ Certification (SY0-701) course. It is designed to prepare you to take and pass the CompTIA exam.
  • You will have the knowledge and confidence to pass the CompTIA exam AND the skills to be a great IT security tech.
  • Your new skills and the CompTIA Security+ cert will help you land a great security tech job or advance your cybersecurity career.
  • This course is ideal as both a study tool and an on-the-job reference for IT security tasks.
Table of Contents

Chapter 0 About Security
1 Introduction to the CompTIA Security SY0701 Exam Prep Course
2 About the CompTIA Security SY0701 Exam
3 How to Take Your CompTIA Security SY0701 Exam

Chapter 1 Risk Management
4 Defining Business Risk
5 Threat Actors Part 1
6 Threat Actors Part 2
7 Threat Intelligence
8 Risk Management Concepts
9 Security Controls
10 Risk Assessments and Treatments
11 Quantitative Risk Assessments
12 Qualitative Risk Assessments
13 Security and the Information Life Cycle
14 Data Destruction
15 Chapter 1 Exam Question Review
16 Wiping Disks with the dd Command Lab
17 Chapter 1 Ask Me Anything AMA

Chapter 2 Foundations of Cryptography
18 Cryptography Basics
19 Hashing
20 Cryptographic Attacks
21 Password Cracking
22 Password Cracking Demo
23 Chapter 2 Exam Question Review
24 SSH Public Key Authentication Lab
25 Chapter 2 Ask Me Anything AMA

Chapter 3 Physical Security
26 Physical Security Overview
27 Physical Security
28 Keylogger Demo
29 Environmental Controls
30 Chapter 3 Exam Question Review
31 Physical Security Lab
32 Chapter 3 Ask Me Anything AMA

Chapter 4 Identity and Account Management
33 Identification Authentication and Authorization
34 Enabling Multifactor Authentication
35 Authorization
36 Accounting
37 Authentication Methods
38 Access Control Schemes
39 Account Management
40 Network Authentication
41 Identity Management Systems
42 Chapter 4 Exam Question Review
43 Creating Linux Users and Groups Lab
44 Chapter 4 Ask Me Anything AMA

Chapter 5 Tools of the Trade
45 Touring the CLI
46 Shells
47 The Windows Command Line
48 Microsoft PowerShell
49 Linux Shells
50 Network Scanners
51 Network Scanning with Nmap
52 Network Protocol Analyzers
53 Using Wireshark to Analyze Network Traffic
54 Using tcpdump to Analyze Network Traffic
55 Log Files
56 Centralized Logging
57 Cybersecurity Benchmark Tools
58 Configuring Linux Log Forwarding
59 Chapter 5 Exam Question Review
60 Linux Shell Script Lab
61 Nmap Lab
62 Chapter 5 Ask Me Anything AMA

Chapter 6 Securing Individual Systems
63 Malware
64 Weak Configurations
65 Common Attacks
66 Overflow Attacks
67 Password Attacks
68 Bots and Botnets
69 Disk RAID Levels
70 Securing Hardware
71 Securing Endpoints
72 Securing Data with Encryption
73 Chapter 6 Exam Question Review
74 Linux Software RAID Lab
75 Secure Enclave Lab in macOS
76 Chapter 6 Ask Me Anything AMA

Chapter 7 Securing The Basic LAN
77 Data Protection
78 Cryptographic Methods
79 Symmetric Cryptosystems
80 Symmetric Block Modes
81 Asymmetric Cryptosystems
82 Understanding Digital Certificates
83 Trust Models
84 Public Key Infrastructure
85 Certificate Types
86 Touring Certificates
87 Network Architecture Planning
88 The OSI Model
89 ARP Cache Poisoning
90 Other Layer 2 Attacks
91 Network Planning
92 Zero Trust Network Access ZTNA 20
93 Load Balancing
94 Securing Network Access
95 Honeypots
96 Static and Dynamic Code Analysis
97 Firewalls
98 Proxy Servers
99 Web Filtering
100 Network and Port Address Translation
101 IP Security IPsec
102 SDWAN and SASE
103 Virtual Private Networks VPNs
104 Intrusion Detection and Prevention Systems IDSIPS
105 Chapter 7 Exam Question Review
106 Linux Snort IDS Lab
107 Chapter 7 Ask Me Anything AMA

Chapter 8 Securing Wireless LANs
108 WiFi Encryption Standards
109 RFID NFC and Bluetooth
110 WiFi Coverage and Performance
111 WiFi Discovery and Attacks
112 Cracking WPA2
113 WiFi Hardening
114 Chapter 8 Exam Question Review
115 WPA2 Cracking Lab
116 Chapter 8 Ask Me Anything AMA

Chapter 9 Securing Virtual and Cloud Environments
117 Defending a Public Server
118 Common Attacks and Mitigations
119 DDoS Attacks in the Real World
120 Containers and SoftwareDefined Networking
121 Hypervisors and Virtual Machines
122 Cloud Deployment Models
123 Cloud Service Models
124 Securing the Cloud
125 Chapter 9 Exam Question Review
126 Docker Container Lab
127 Chapter 9 Ask Me Anything AMA

Chapter 10 Securing Dedicated and Mobile Systems
128 Industrial Control System ICS
129 Internet of Things IoT Devices
130 Connecting to Dedicated and Mobile Systems
131 Security Constraints for Dedicated Systems
132 Mobile Device Deployment and Hardening
133 Chapter 10 Exam Question Review
134 Smartphone Hardening Lab
135 Embedded Systems
136 Chapter 10 Ask Me Anything AMA

Chapter 11 Secure Protocols and Applications
137 DNS Security
138 FTP Packet Capture
139 Secure Web and Email
140 Request Forgery Attacks
141 CrossSite Scripting Attacks
142 Web Application Security
143 OWASP Top 10
144 Web App Vulnerability Scanning
145 Chapter 11 Exam Question Review
146 OWASP ZAP Web App Scan Lab
147 Chapter 11 Ask Me Anything AMA

Chapter 12 Testing Infrastructure
148 Testing Infrastructure Overview
149 Social Engineering Attacks
150 Vulnerability Assessments
151 Penetration Testing
152 The Metasploit Framework
153 Chapter 12 Exam Question Review
154 Chapter 12 Ask Me Anything AMA

Chapter 13 Business Security Impact
155 Introduction to Business Security
156 Business Impact Analysis
157 Data Types and Roles
158 Personnel Risk and Policies
159 Attestation
160 Internal Audits and Assessments
161 External Audits and Assessments
162 ThirdParty Risk Management
163 Agreement Types
164 Change Management
165 Technical Change Management
166 What Is Automation and Orchestration
167 Benefits of Automation and Orchestration
168 Use Cases of Automation and Orchestration
169 Other Considerations of Automation and Orchestration
170 Putting It All Together
171 Exploring the NIST Frameworks

Chapter 14 Dealing with Incidents
172 Incident Response Overview
173 Incident Response Plans IRPs
174 IRP Testing
175 Threat Analysis and Mitigating Actions
176 Digital Forensics
177 Business Continuity and Alternate Sites
178 Data Backup
179 Chapter 14 Exam Question Review
180 Autopsy Forensic Browser Lab
181 Chapter 14 Ask Me Anything AMA

Practice Exam
CompTIA Security Practice Test

Bonus Lecture
182 Bonus Video

Homepage