Autoplay
Autocomplete
Previous Lesson
Complete and Continue
CompTIA Security+ Certification Bootcamp
Introduction
CompTIA Security+ Certification Bootcamp (3:00)
Exercise: Meet Your Classmates and Instructor
Security+ Cheatsheet
ZTM Plugin + Understanding Your Video Player
Set Your Learning Streak Goal
Introduction to Security Basics
Introduction (2:03)
What Is Security+? (5:14)
How To Succeed (4:20)
Security Basics and CIA Triangle (8:38)
Let's Have Some Fun (+ Free Resources)
Authentication and Access Control
The Power of Control, Different Types of Control (13:26)
Different Types of Identity / Identification (3:45)
Account Access Control and Privilege Management (7:27)
File Access Control (Windows, Linux) (6:22)
AAA Servers (7:18)
Different Types of Authentication and Authentication Management (11:32)
Different Existing Authentication and Authorization Mechanisms (12:56)
Account Control Practices and Policies (10:16)
Unlimited Updates
Secure Network Design and Concept
OSI Model (3:56)
Honeypots, Proxy Servers, Jump Servers, Load Balancers (10:18)
Routers, Switches, ACL, Loop Protection (5:09)
Firewalls (5:48)
Network Segmentation (6:28)
IDS, IPS, NAC (7:56)
DNS, DNS Security (6:31)
IP Addresses (5:32)
Dynamic Host Configuration Protocol (DHCP) (3:30)
Virtual Private Network (VPN) (9:04)
Networking Tools / Commands (22:12)
File Manipulation Tools / Commands (8:52)
Forensic Tools / Commands (5:13)
Course Check-In
Security Protocols
Transmission Control Protocol (TCP) and User Datagram Protocol (UDP) (3:28)
Unsecure Protocols (7:15)
Secure Protocols (5:07)
Wireless and Mobile Security
Wireless Infrastructure (9:28)
Wireless Encryption and Threats (8:18)
Wireless Authentication Protocols (2:18)
Mobile Device Connection and Communication Methods (3:43)
Mobile Device Management (7:24)
Mobile Device Monitoring and Protection (7:28)
Implement a New Life System
Virtualization and Cloud Security
Virtualization Theory (6:58)
Virtual Box Demonstration (4:45)
Cloud Technology (6:01)
Cloud Services (7:06)
Storing Data in Cloud and Cloud Security (7:55)
Physical Security and Facilities Security
Physical Security (6:40)
Monitoring, Scanning, Hacking
What is Penetration Testing? (5:17)
Different Phases of a Penetration Test (7:12)
Different Teams in Cyber Security (2:38)
Vulnerabilities (5:43)
Monitoring (5:17)
Exercise: Imposter Syndrome (2:55)
Threats, Attacks, Vulnerabilities
Different Types of Attackers (5:14)
Different Types of Malware (8:08)
Social Engineering, Phishing (8:25)
Network Attacks (7:24)
Physical Attacks (4:01)
Password Attacks (7:08)
Overflow Attacks, Pointer Dereference, Error Handling (6:48)
Application Attacks, Injection Attacks (8:42)
Zero Days and Weak Configurations (4:18)
Hijacking Attacks (2:58)
Cryptographic Attacks (2:44)
Third Party Attacks (4:10)
System Hardening and Application Testing
Host Security Boot (3:02)
Endpoint Protection Strategy (8:13)
System Hardening (2:43)
Inbuilt Devices and Specialized Devices (9:27)
Secure Application Development and Secure Coding (10:48)
Risk Management
Concept of Risk and Risk Types (6:14)
Risk Control and Analysis (8:03)
Business Impact Analysis (6:37)
Security Information Groups and Sources (5:39)
Facility Policies and Rules (6:17)
Laws and Standards (5:24)
Data Handling (7:31)
Incident Responding and Forensics
Incident Response and Recovery Practices (11:31)
Information Gathering for Incident Response (8:02)
Controls and Techniques for Lowering Risk (5:41)
Redundancy and Tolerance (10:06)
Cryptography and Public Key Infrastructure (PKI)
Concept of Public Key Infrastructure (8:46)
Symmetric and Asymmetric Encryption (7:28)
Important Cryptographic Terms and Concepts (9:00)
Practice Test
Test Instructions
CompTIA Security+ Practice Test
Where To Go From Here?
Thank You! (1:17)
Review This Course!
Become An Alumni
Learning Guideline
ZTM Events Every Month
LinkedIn Endorsements
Different Types of Identity / Identification
This lecture is available exclusively for ZTM Academy members.
If you're already a member,
you'll need to login
.
Join ZTM To Unlock All Lectures