CompTIA Security+ (SY0-501) Complete Course and Practice Exam [eLearning]

Tài liệu bonus cho các bạn đăng kí compo Voucher SY0-501 và Dump

Sau khi đăng kí các bạn sẽ được cấp 1 tài khoản tại UDEMY VIETNAM để xem khóa học trong 365 ngày.

Security+ SY0-501 Mike Chapple Video Training

CompTIA Security+ (SY0-501) Complete Course and Practice Exam [eLearning]

0101.Welcome.
0102.Overview of Security.
0103.CIA Triad.
0104.AAA of Security.
0105.Security Threats.
0106.Mitigating Threats.
0107.Hackers.
0108.Threat Actors.


0201.Malware.
0202.Viruses.
0203.Worms.
0204.Trojans.
0205.Demo Viruses and Trojans.
0206.Ransomware.
0207.Spyware.
0208.Rootkits.
0209.Spam.
0210.Summary of Malware.
0301.Malware Infections.
0302.Common Delivery Methods.
0303.Demo Phishing.
0304.Botnets and Zombies.
0305.Active Interception and Privilege Escalation.
0306.Demo Privilege Escalation.
0307.Backdoors and Logic Bombs.
0308.Symptoms of Infection.
0309.Removing Malware.
0310.Preventing Malware.
0401.Security Applications and Devices.
0402.Software Firewalls.
0403.Demo Software Firewalls.
0404.IDS.
0405.Pop-up Blockers.
0406.Data Loss Prevention (DLP).
0407.Securing the BIOS.
0408.Securing Storage Devices.
0409.Disk Encryption.
0501.Mobile Device Security.
0502.Securing Wireless Devices.
0503.Mobile Malware.
0504.SIM Cloning & ID Theft.
0505.Bluetooth Attacks.
0506.Mobile Device Theft.
0507.Security of Apps.
0508.BYOD.
0509.Hardening Mobile Devices.
0601.Hardening.
0602.Unnecessary Applications.
0603.Restricting Applications.
0604.Demo Unnecessary Services.
0605.Trusted Operating System.
0606.Updates and Patches.
0607.Patch Management.
0608.Group Policies.
0609.Demo Group Policies.
0610.File Systems and Hard Drives.
0701.Virtualization.
0702.Hypervisors.
0703.Demo How to create a VM.
0704.Threats to VMs.
0705.Securing VMs.
0706.Demo Securing VMs.
0801.Application Security.
0802.Web Browser Security.
0803.Web Browser Concerns.
0804.Demo Web Browser Configuration.
0805.Securing Applications.
0901.Software Development.
0902.SDLC Principles.
0903.Testing Methods.
0904.Software Vulnerabilities and Exploits.
0905.Buffer Overflows.
0906.Demo Buffer Overflow Attack.
0907.XSS and XSRF.
0908.SQL Injection.
0909.Demo SQL Injection.
1001.Network Security.
1002.The OSI Model.
1003.Switches.
1004.Routers.
1005.Network Zones.
1006.Network Access Control.
1007.VLANs.
1008.Subnetting.
1009.Network Address Translation.
1010.Telephony.
1101.Perimeter Security.
1102.Firewalls.
1103.Demo SOHO Firewall.
1104.Proxy Servers.
1105.Honeypots and Honeynets.
1106.Data Loss Prevention.
1107.NIDS and NIPS.
1108.Unified Threat Management.
1201.Cloud Computing.
1202.Cloud Types.
1203.As a Service.
1204.Cloud Security.
1205.Defending Servers.
1301.Network Attacks.
1302.Ports and Protocols.
1303.Memorization of Ports.
1304.Unnecessary Ports.
1305.Denial of Service.
1306.DDoS.
1307.Stopping a DDoS.
1308.Spoofing.
1309.Hijacking.
1310.Replay Attack.
1311.Demo Null Sessions.
1312.Transitive Attacks.
1313.DNS Attacks.
1314.ARP Poisoning.
1401.Securing Networks.
1402.Securing Network Devices.
1403.Securing Network Media.
1404.Securing WiFi Devices.
1405.Wireless Encryption.
1406.Wireless Access Points.
1407.Wireless Attacks.
1408.Demo Wireless Attack.
1409.Other Wireless Technologies.
1501.Physical Security.
1502.Surveillance.
1503.Door Locks.
1504.Demo Lock Picking.
1505.Biometric Readers.
1601.Facilities Security.
1602.Fire Suppression.
1603.HVAC.
1604.Shielding.
1605.Vehicles.
1701.Authentication.
1702.Authentication Models.
1703.802.1x.
1704.LDAP and Kerberos.
1705.Remote Desktop Services.
1706.Remote Access Service.
1707.VPN.
1708.RADIUS vs TACACS+.
1709.Authentication Summary.
1801.Access Control.
1802.Access Control Models.
1803.Best Practices.
1804.Users and Groups.
1805.Permissions.
1806.Usernames and Passwords.
1807.Demo Policies.
1808.User Account Control.
1901.Risk Assessments.
1902.Qualitative Risk.
1903.Quantitative Risk.
1904.Methodologies.
1905.Security Controls.
1906.Vulnerability Management.
1907.Penetration Testing.
1908.OVAL.
1909.Vulnerability Assessments.
1910.Demo Nmap Scanning.
1911.Demo Vulnerability Scanning.
1912.Password Analysis.
1913.Demo Password Cracking.
2001.Monitoring Types.
2002.Performance Baselining.
2003.Protocol Analyzers.
2004.SNMP.
2005.Demo Analytical Tools.
2006.Auditing.
2007.Demo Auditing Files.
2008.Logging.
2009.Log Files.
2010.SIEM.
2101.Cryptography.
2102.Symmetric vs Asymmetric.
2103.Symmetric Algorithms.
2104.Public Key Cryptography.
2105.Asymmetric Algorithms.
2106.Pretty Good Privacy.
2107.Key Management.
2108.One-Time Pad.
2109.Demo Steganography.
2110.Hashing.
2111.Demo Hashing.
2112.Hashing Attacks.
2113.Increasing Hash Security.
2201.Public Key Infrastructure.
2202.Digital Certificates.
2203.Demo Certificates.
2204.Certificate Authorities.
2205.Web of Trust.
2301.Security Protocols.
2302.SMIME.
2303.SSL and TLS.
2304.SSH.
2305.VPN Protocols.
2306.Demo Setting up a VPN.
2401.Planning for the Worst.
2402.Redundant Power.
2403.Backup Power.
2404.Data Redundancy.
2405.Demo RAIDs.
2406.Network Redundancy.
2407.Server Redundancy.
2408.Redundant Sites.
2409.Data Backup.
2410.Tape Rotation.
2411.Disaster Recovery Plan.
2501.Social Engineering.
2502.Demo Pretexting.
2503.Insider Threat.
2504.Phishing.
2505.More Social Engineering.
2506.User Education.
2601.Policies and Procedures.
2602.Data Classifications.
2603.PII and PHI.
2604.Security Policies.
2605.User Education.
2606.Vendor Relationships.
2607.Disposal Policies.
2608.Incident Response Procedures.
2609.Data Collection Procedures.
2610.Demo Disk Imaging.
2611.IT Security Frameworks.
2701.Conclusion.
2702.Exam Tricks.

Published by Security365

Learn Everywhere with Đông Dương ICT

2 thoughts on “CompTIA Security+ (SY0-501) Complete Course and Practice Exam [eLearning]

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out /  Change )

Google photo

You are commenting using your Google account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s

%d bloggers like this: