Security+ SY0-501 Video Training (Best Seller)

Security+ SY0-501 Mike Chapple

Tài liệu bonus cho các bạn đăng kí compo Voucher SY0-501 và Dump

Sau khi đăng kí các bạn sẽ được cấp 1 tài khoản tại udemy.edu.vn để xem khóa học trong 365 ngày.

Part 1_01 Introduction_001 Welcome.
Part 1_01 Introduction_002 What you need to know.
Part 1_02 Malware_001 Comparing viruses worms and Trojans.
Part 1_02 Malware_002 Comparing adware spyware and ransomware.
Part 1_02 Malware_003 Understanding backdoors and logic bombs.
Part 1_02 Malware_004 Looking at advanced malware.
Part 1_02 Malware_005 Understanding botnets.
Part 1_02 Malware_006 Advanced persistent threats.
Part 1_03 Understanding Attackers_001 Cybersecurity adversaries.
Part 1_03 Understanding Attackers_002 Preventing insider threats.
Part 1_03 Understanding Attackers_003 Threat intelligence.
Part 1_04 Understanding Attack Types_001 Denial of service attacks.
Part 1_04 Understanding Attack Types_002 Eavesdropping attacks.
Part 1_04 Understanding Attack Types_003 Network attacks.
Part 1_04 Understanding Attack Types_004 Network address spoofing.
Part 1_04 Understanding Attack Types_005 Password attacks.
Part 1_04 Understanding Attack Types_006 Brute force cryptographic attacks.
Part 1_04 Understanding Attack Types_007 Knowledge-based crytpographic attacks.
Part 1_04 Understanding Attack Types_008 Watering hole attacks.
Part 1_05 Wireless Attacks_001 Wireless eavesdropping.
Part 1_05 Wireless Attacks_002 WPA and WPS attacks.
Part 1_05 Wireless Attacks_003 Propagation attacks.
Part 1_05 Wireless Attacks_004 Preventing rogues and evil twins.
Part 1_05 Wireless Attacks_005 Disassociation attacks.
Part 1_05 Wireless Attacks_006 Understanding Bluetooth and NFC attacks.
Part 1_05 Wireless Attacks_007 RFID security.
Part 1_06 Application Attacks_001 Application security.
Part 1_06 Application Attacks_002 Preventing SQL injection.
Part 1_06 Application Attacks_003 Understanding cross-site scripting.
Part 1_06 Application Attacks_004 Understanding cross-site request forgery.
Part 1_06 Application Attacks_005 Clickjacking.
Part 1_06 Application Attacks_006 Defending against directory traversal.
Part 1_06 Application Attacks_007 Overflow attacks.
Part 1_06 Application Attacks_008 Explaining cookies and attachments.
Part 1_06 Application Attacks_009 Session hijacking.
Part 1_06 Application Attacks_010 Malicious add-ons.
Part 1_06 Application Attacks_011 Code execution attacks.
Part 1_06 Application Attacks_012 Driver manipulation.
Part 1_06 Application Attacks_013 Error and exception handling.
Part 1_07 Social Engineering Attacks_001 Social engineering.
Part 1_07 Social Engineering Attacks_002 Impersonation attacks.
Part 1_07 Social Engineering Attacks_003 Physical social engineering.
Part 1_08 Vulnerability Scanning and Penetration Testing_001 Security assessment tools.
Part 1_08 Vulnerability Scanning and Penetration Testing_002 Scanning for vulnerabilities.
Part 1_08 Vulnerability Scanning and Penetration Testing_003 Assessing threats.
Part 1_08 Vulnerability Scanning and Penetration Testing_004 Threat assessment techniques.
Part 1_08 Vulnerability Scanning and Penetration Testing_005 Penetration testing.
Part 1_08 Vulnerability Scanning and Penetration Testing_006 Advanced vulnerability scanning.
Part 1_09 Impact of Vulnerabilities_001 Vendor vulnerabilities.
Part 1_09 Impact of Vulnerabilities_002 Memory vulnerabilities.
Part 1_09 Impact of Vulnerabilities_003 Race condition vulnerabilities.
Part 1_09 Impact of Vulnerabilities_004 Configuration vulnerabilities.
Part 1_09 Impact of Vulnerabilities_005 Architectural vulnerabilities.
Part 1_10 Conclusion_001 Next steps.
Part 2_01 Introduction_001 Welcome.
Part 2_01 Introduction_002 What you need to know.
Part 2_02 TCP_IP Suite_001 Introducing TCP_IP.
Part 2_02 TCP_IP Suite_002 IP addresses.
Part 2_02 TCP_IP Suite_003 Domain name service.
Part 2_02 TCP_IP Suite_004 Network ports.
Part 2_02 TCP_IP Suite_005 ICMP.
Part 2_03 Network Security Devices_001 Routers switches and bridges.
Part 2_03 Network Security Devices_002 Firewalls.
Part 2_03 Network Security Devices_003 Proxies.
Part 2_03 Network Security Devices_004 Load balancers.
Part 2_03 Network Security Devices_005 VPNs and VPN concentrators.
Part 2_03 Network Security Devices_006 IPsec.
Part 2_03 Network Security Devices_007 Network intrusion detection and prevention.
Part 2_03 Network Security Devices_008 Unified threat management.
Part 2_03 Network Security Devices_009 OpenID Connect.
Part 2_04 Managing Secure Networks_001 Firewall rule management.
Part 2_04 Managing Secure Networks_002 Router configuration security.
Part 2_04 Managing Secure Networks_003 Switch configuration security.
Part 2_04 Managing Secure Networks_004 Maintaining network availability.
Part 2_04 Managing Secure Networks_005 Network monitoring.
Part 2_04 Managing Secure Networks_006 SNMP.
Part 2_04 Managing Secure Networks_007 Storage networks.
Part 2_05 Wireless Networking_001 Wireless networking.
Part 2_05 Wireless Networking_002 Basic wireless security.
Part 2_05 Wireless Networking_003 WEP WPA and WPA2.
Part 2_05 Wireless Networking_004 Wireless authentication.
Part 2_05 Wireless Networking_005 Wireless signal propagation.
Part 2_05 Wireless Networking_006 Wireless networking equipment.
Part 2_06 Security and Monitoring Technologies_001 Correlating security information.
Part 2_06 Security and Monitoring Technologies_002 Tuning and configuring SIEMs.
Part 2_06 Security and Monitoring Technologies_003 Continuous security monitoring.
Part 2_06 Security and Monitoring Technologies_004 Data loss prevention.
Part 2_06 Security and Monitoring Technologies_005 Network access control.
Part 2_06 Security and Monitoring Technologies_006 Mail gateways.
Part 2_06 Security and Monitoring Technologies_007 Data sanitization tools.
Part 2_06 Security and Monitoring Technologies_008 Steganography.
Part 2_07 Security Assessment Tools_001 Protocol analyzers.
Part 2_07 Security Assessment Tools_002 Network scanning.
Part 2_07 Security Assessment Tools_003 Exploitation frameworks.
Part 2_07 Security Assessment Tools_004 Command line network tools.
Part 2_07 Security Assessment Tools_005 DNS harvesting.
Part 2_08 Security Troubleshooting_001 Troubleshooting authentication and authorization.
Part 2_08 Security Troubleshooting_002 Troubleshooting digital certificates.
Part 2_08 Security Troubleshooting_003 Troubleshooting device configurations.
Part 2_08 Security Troubleshooting_004 Change and configuration management.
Part 2_08 Security Troubleshooting_005 Physical asset management.
Part 2_09 Personnel Security_001 Personnel security.
Part 2_09 Personnel Security_002 Security in the hiring process.
Part 2_09 Personnel Security_003 Employee termination process.
Part 2_09 Personnel Security_004 Employee privacy.
Part 2_09 Personnel Security_005 Social networking.
Part 2_09 Personnel Security_006 Personnel safety.
Part 2_10 Host Security_001 Operating system security.
Part 2_10 Host Security_002 Malware prevention.
Part 2_10 Host Security_003 Application management.
Part 2_10 Host Security_004 Host-based network security controls.
Part 2_10 Host Security_005 File integrity monitoring.
Part 2_10 Host Security_006 Removable media control.
Part 2_10 Host Security_007 Data execution prevention.
Part 2_11 Mobile Device Security_001 Mobile connection methods.
Part 2_11 Mobile Device Security_002 Mobile device security.
Part 2_11 Mobile Device Security_003 Mobile device management.
Part 2_11 Mobile Device Security_004 Mobile device tracking.
Part 2_11 Mobile Device Security_005 Mobile application security.
Part 2_11 Mobile Device Security_006 Mobile security enforcement.
Part 2_11 Mobile Device Security_007 Bring your own device.
Part 2_11 Mobile Device Security_008 Mobile deployment models.
Part 2_12 Securing Protocols_001 TLS and SSL.
Part 2_12 Securing Protocols_002 Protocol security use cases.
Part 2_12 Securing Protocols_003 Securing common protocols.
Part 2_12 Securing Protocols_004 Cryptographic hardware.
Part 2_13 Conclusion_001 Next steps.
Part 3_01 Introduction_001 Welcome.
Part 3_01 Introduction_002 What you need to know.
Part 3_02 Security Design_001 Legislative and regulatory compliance.
Part 3_02 Security Design_002 Frameworks and reference architectures.
Part 3_02 Security Design_003 Developing security baselines.
Part 3_02 Security Design_004 Leveraging industry standards.
Part 3_02 Security Design_005 Customizing security standards.
Part 3_02 Security Design_006 Defense in depth.
Part 3_02 Security Design_007 Control diversity.
Part 3_03 User Training_001 Security education.
Part 3_03 User Training_002 Information classification.
Part 3_03 User Training_003 Compliance training.
Part 3_03 User Training_004 User habits.
Part 3_03 User Training_005 User-based threats.
Part 3_03 User Training_006 Measuring security education.
Part 3_04 Secure Network Design_001 Security zones.
Part 3_04 Secure Network Design_002 Public and private addressing.
Part 3_04 Secure Network Design_003 Subnetting.
Part 3_04 Secure Network Design_004 VLANs and network segmentation.
Part 3_04 Secure Network Design_005 Security device placement.
Part 3_04 Secure Network Design_006 Software-defined networking (SDN).
Part 3_04 Secure Network Design_007 Port isolation.
Part 3_05 Secure Systems Design_001 Operating system types.
Part 3_05 Secure Systems Design_002 Data encryption.
Part 3_05 Secure Systems Design_003 Hardware and firmware security.
Part 3_05 Secure Systems Design_004 Peripheral security.
Part 3_05 Secure Systems Design_005 IT automation.
Part 3_05 Secure Systems Design_006 Non-persistence.
Part 3_06 Secure Staging and Deployment_001 Software staging and release.
Part 3_06 Secure Staging and Deployment_002 Software risk assessment and mitigation.
Part 3_06 Secure Staging and Deployment_003 Secure baselines and integrity measurement.
Part 3_07 Embedded System Security_001 Industrial control systems.
Part 3_07 Embedded System Security_002 Internet of Things.
Part 3_07 Embedded System Security_003 Securing smart devices.
Part 3_07 Embedded System Security_004 Secure networking for smart devices.
Part 3_07 Embedded System Security_005 Embedded systems.
Part 3_08 Software Development Securityy_001 Development methodologies.
Part 3_08 Software Development Securityy_002 Maturity models.
Part 3_08 Software Development Securityy_003 Operation maintenance and change management.
Part 3_08 Software Development Securityy_004 DevOps.
Part 3_08 Software Development Securityy_005 Code repositories.
Part 3_08 Software Development Securityy_006 Third-party code.
Part 3_08 Software Development Securityy_007 Code signing.
Part 3_08 Software Development Securityy_008 Database security controls.
Part 3_08 Software Development Securityy_009 Software testing.
Part 3_08 Software Development Securityy_010 Code reviews.
Part 3_08 Software Development Securityy_011 Code tests.
Part 3_08 Software Development Securityy_012 Fuzz testing.
Part 3_08 Software Development Securityy_013 Code Execution.
Part 3_09 Cloud Computing and Virtualization_001 Virtualization.
Part 3_09 Cloud Computing and Virtualization_002 Cloud computing models.
Part 3_09 Cloud Computing and Virtualization_003 Public cloud tiers.
Part 3_09 Cloud Computing and Virtualization_004 Cloud storage security.
Part 3_09 Cloud Computing and Virtualization_005 Security service providers.
Part 3_09 Cloud Computing and Virtualization_006 Desktop and application virtualization.
Part 3_10 Physical Security_001 Site and facility design.
Part 3_10 Physical Security_002 Data center environmental controls.
Part 3_10 Physical Security_003 Data center environmental protection.
Part 3_10 Physical Security_004 Physical security control types.
Part 3_10 Physical Security_005 Physical access control.
Part 3_10 Physical Security_006 Visitor management.
Part 3_10 Physical Security_007 Hardware physical security.
Part 3_11 Conclusion_001 Whats next_.
Part 4_01 Introduction_001 Welcome.
Part 4_01 Introduction_002 What you need to know.
Part 4_02 Identification_001 Identification authentication authorization and accounting.
Part 4_02 Identification_002 Usernames and access cards.
Part 4_02 Identification_003 Biometrics.
Part 4_03 Authentication_001 Authentication factors.
Part 4_03 Authentication_002 Multifactor authentication.
Part 4_03 Authentication_003 Something you have.
Part 4_03 Authentication_004 Password authentication protocols.
Part 4_03 Authentication_005 Single sign-on and federation.
Part 4_03 Authentication_006 RADIUS and TACACS.
Part 4_03 Authentication_007 Kerberos and LDAP.
Part 4_03 Authentication_008 SAML.
Part 4_03 Authentication_009 OAUTH and OpenID Connect.
Part 4_03 Authentication_010 Certificate-based authentication.
Part 4_04 Authorization_001 Understanding authorization.
Part 4_04 Authorization_002 Mandatory access controls.
Part 4_04 Authorization_003 Discretionary access controls.
Part 4_04 Authorization_004 Access control lists.
Part 4_04 Authorization_005 Advanced authorization concepts.
Part 4_04 Authorization_006 Database access control.
Part 4_05 Account Management_001 Understanding account and privilege management.
Part 4_05 Account Management_002 Account types.
Part 4_05 Account Management_003 Account policies.
Part 4_05 Account Management_004 Password policy.
Part 4_05 Account Management_005 Managing roles.
Part 4_05 Account Management_006 Account monitoring.
Part 4_05 Account Management_007 Provisioning and deprovisioning.
Part 4_06 Conclusion_001 Next steps.
Part 5_01 Introduction_001 Welcome.
Part 5_01 Introduction_002 What you need to know.
Part 5_02 Controls and Risks_001 Security controls.
Part 5_02 Controls and Risks_002 Security policy framework.
Part 5_02 Controls and Risks_003 Security policies.
Part 5_02 Controls and Risks_004 Risk assessment.
Part 5_02 Controls and Risks_005 Quantitative risk assessment.
Part 5_02 Controls and Risks_006 Risk management.
Part 5_02 Controls and Risks_007 Risk visibility and reporting.
Part 5_03 Supply Chain Risk_001 Managing vendor relationships.
Part 5_03 Supply Chain Risk_002 Vendor agreements.
Part 5_03 Supply Chain Risk_003 Vendor information management.
Part 5_04 Personnel Management_001 Need to know and least privilege.
Part 5_04 Personnel Management_002 Separation of duties and responsibilities.
Part 5_04 Personnel Management_003 Security in the hiring process.
Part 5_04 Personnel Management_004 Employee termination process.
Part 5_05 Awareness and Trainingt_001 Security education.
Part 5_05 Awareness and Trainingt_002 Information classification.
Part 5_05 Awareness and Trainingt_003 Compliance training.
Part 5_05 Awareness and Trainingt_004 User habits.
Part 5_05 Awareness and Trainingt_005 User-based threats.
Part 5_05 Awareness and Trainingt_006 Measuring security education.
Part 5_06 Business Continuity and Disaster Recovery_001 Business continuity planning.
Part 5_06 Business Continuity and Disaster Recovery_002 Business continuity controls.
Part 5_06 Business Continuity and Disaster Recovery_003 High availability and fault tolerance.
Part 5_06 Business Continuity and Disaster Recovery_004 Disaster recovery.
Part 5_06 Business Continuity and Disaster Recovery_005 Backups.
Part 5_06 Business Continuity and Disaster Recovery_006 Disaster recovery sites.
Part 5_06 Business Continuity and Disaster Recovery_007 Geographic disaster recovery considerations.
Part 5_06 Business Continuity and Disaster Recovery_008 Testing BC_DR plans.
Part 5_06 Business Continuity and Disaster Recovery_009 After action reports.
Part 5_07 Incident Response_001 Security incidents.
Part 5_07 Incident Response_002 Preparing for incident response.
Part 5_07 Incident Response_003 Incident identification and containment.
Part 5_07 Incident Response_004 Escalation and notification.
Part 5_07 Incident Response_005 Incident mitigation.
Part 5_07 Incident Response_006 Eradication and recovery.
Part 5_07 Incident Response_007 Lessons learned and reporting.
Part 5_08 Forensics_001 Conducting investigations.
Part 5_08 Forensics_002 Evidence types.
Part 5_08 Forensics_003 Introduction to forensics.
Part 5_08 Forensics_004 System and file forensics.
Part 5_08 Forensics_005 Network forensics.
Part 5_08 Forensics_006 Software forensics.
Part 5_08 Forensics_007 Embedded device forensics.
Part 5_08 Forensics_008 Chain of custody.
Part 5_08 Forensics_009 Electronic discovery (ediscovery).
Part 5_09 Data Security and Privacy_001 Understanding data security.
Part 5_09 Data Security and Privacy_002 Data security policies.
Part 5_09 Data Security and Privacy_003 Data security roles.
Part 5_09 Data Security and Privacy_004 Data privacy.
Part 5_09 Data Security and Privacy_005 Limiting data collection.
Part 5_09 Data Security and Privacy_006 Privacy assessments.
Part 5_10 Conclusion_001 Next steps.
Part 6_01 Introduction_001 Welcome.
Part 6_01 Introduction_002 What you need to know.
Part 6_02 Encryption_001 Understanding encryption.
Part 6_02 Encryption_002 Symmetric and asymmetric cryptography.
Part 6_02 Encryption_003 Goals of cryptography.
Part 6_02 Encryption_004 Codes and ciphers.
Part 6_02 Encryption_005 Cryptographic math.
Part 6_02 Encryption_006 The perfect encryption algorithm.
Part 6_02 Encryption_007 Choosing encryption algorithms.
Part 6_02 Encryption_008 The cryptographic lifecycle.
Part 6_03 Symmetric Cryptography_001 Data encryption standard.
Part 6_03 Symmetric Cryptography_002 DES.
Part 6_03 Symmetric Cryptography_003 AES Blowfish and Twofish.
Part 6_03 Symmetric Cryptography_004 RC4.
Part 6_03 Symmetric Cryptography_005 Cipher modes.
Part 6_03 Symmetric Cryptography_006 Steganography.
Part 6_04 Asymmetric Cryptography_001 Rivest-Shamir-Adleman (RSA).
Part 6_04 Asymmetric Cryptography_002 PGP and GnuPG.
Part 6_04 Asymmetric Cryptography_003 Elliptic curve and quantum cryptography.
Part 6_04 Asymmetric Cryptography_004 Tor and perfect forward secrecy.
Part 6_05 Key Management_001 Key exchange.
Part 6_05 Key Management_002 Diffie-Hellman.
Part 6_05 Key Management_003 Key escrow.
Part 6_05 Key Management_004 Key stretching.
Part 6_06 Public Key Infrastructure_001 Trust models.
Part 6_06 Public Key Infrastructure_002 PKI and digital certificates.
Part 6_06 Public Key Infrastructure_003 Hash functions.
Part 6_06 Public Key Infrastructure_004 Digital signatures.
Part 6_06 Public Key Infrastructure_005 Digital signature standard.
Part 6_06 Public Key Infrastructure_006 Create a digital certificate.
Part 6_06 Public Key Infrastructure_007 Revoke a digital certificate.
Part 6_06 Public Key Infrastructure_008 Certificate stapling.
Part 6_06 Public Key Infrastructure_009 Certificate authorities.
Part 6_06 Public Key Infrastructure_010 Certificate subjects.
Part 6_06 Public Key Infrastructure_011 Certificate types.
Part 6_06 Public Key Infrastructure_012 Certificate formats.
Part 6_07 Cryptanalytic Attacks_001 Brute force attacks.
Part 6_07 Cryptanalytic Attacks_002 Knowledge-based attacks.
Part 6_08 Cryptographic Applications_001 Digital rights management.
Part 6_08 Cryptographic Applications_002 Specialized use cases.
Part 6_09 Conclusion_001 Next steps.

Published by Security365

Learn Everywhere with Đông Dương ICT

3 thoughts on “Security+ SY0-501 Video Training (Best Seller)

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out /  Change )

Google photo

You are commenting using your Google account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s

%d bloggers like this: