Autoplay
Autocomplete
Previous Lesson
Complete and Continue
CompTIA Security+ Certification Bootcamp
Introduction
CompTIA Security+ Certification Bootcamp (3:00)
Exercise: Meet Your Classmates and Instructor
Security+ Cheatsheet
ZTM Plugin + Understanding Your Video Player
Set Your Learning Streak Goal
Introduction to Security Basics
Introduction (2:03)
What Is Security+? (5:14)
How To Succeed (4:20)
Security Basics and CIA Triangle (8:38)
Let's Have Some Fun (+ Free Resources)
Authentication and Access Control
The Power of Control, Different Types of Control (13:26)
Different Types of Identity / Identification (3:45)
Account Access Control and Privilege Management (7:27)
File Access Control (Windows, Linux) (6:22)
AAA Servers (7:18)
Different Types of Authentication and Authentication Management (11:32)
Different Existing Authentication and Authorization Mechanisms (12:56)
Account Control Practices and Policies (10:16)
Unlimited Updates
Secure Network Design and Concept
OSI Model (3:56)
Honeypots, Proxy Servers, Jump Servers, Load Balancers (10:18)
Routers, Switches, ACL, Loop Protection (5:09)
Firewalls (5:48)
Network Segmentation (6:28)
IDS, IPS, NAC (7:56)
DNS, DNS Security (6:31)
IP Addresses (5:32)
Dynamic Host Configuration Protocol (DHCP) (3:30)
Virtual Private Network (VPN) (9:04)
Networking Tools / Commands (22:12)
File Manipulation Tools / Commands (8:52)
Forensic Tools / Commands (5:13)
Course Check-In
Security Protocols
Transmission Control Protocol (TCP) and User Datagram Protocol (UDP) (3:28)
Unsecure Protocols (7:15)
Secure Protocols (5:07)
Wireless and Mobile Security
Wireless Infrastructure (9:28)
Wireless Encryption and Threats (8:18)
Wireless Authentication Protocols (2:18)
Mobile Device Connection and Communication Methods (3:43)
Mobile Device Management (7:24)
Mobile Device Monitoring and Protection (7:28)
Implement a New Life System
Virtualization and Cloud Security
Virtualization Theory (6:58)
Virtual Box Demonstration (4:45)
Cloud Technology (6:01)
Cloud Services (7:06)
Storing Data in Cloud and Cloud Security (7:55)
Physical Security and Facilities Security
Physical Security (6:40)
Monitoring, Scanning, Hacking
What is Penetration Testing? (5:17)
Different Phases of a Penetration Test (7:12)
Different Teams in Cyber Security (2:38)
Vulnerabilities (5:43)
Monitoring (5:17)
Exercise: Imposter Syndrome (2:55)
Threats, Attacks, Vulnerabilities
Different Types of Attackers (5:14)
Different Types of Malware (8:08)
Social Engineering, Phishing (8:25)
Network Attacks (7:24)
Physical Attacks (4:01)
Password Attacks (7:08)
Overflow Attacks, Pointer Dereference, Error Handling (6:48)
Application Attacks, Injection Attacks (8:42)
Zero Days and Weak Configurations (4:18)
Hijacking Attacks (2:58)
Cryptographic Attacks (2:44)
Third Party Attacks (4:10)
System Hardening and Application Testing
Host Security Boot (3:02)
Endpoint Protection Strategy (8:13)
System Hardening (2:43)
Inbuilt Devices and Specialized Devices (9:27)
Secure Application Development and Secure Coding (10:48)
Risk Management
Concept of Risk and Risk Types (6:14)
Risk Control and Analysis (8:03)
Business Impact Analysis (6:37)
Security Information Groups and Sources (5:39)
Facility Policies and Rules (6:17)
Laws and Standards (5:24)
Data Handling (7:31)
Incident Responding and Forensics
Incident Response and Recovery Practices (11:31)
Information Gathering for Incident Response (8:02)
Controls and Techniques for Lowering Risk (5:41)
Redundancy and Tolerance (10:06)
Cryptography and Public Key Infrastructure (PKI)
Concept of Public Key Infrastructure (8:46)
Symmetric and Asymmetric Encryption (7:28)
Important Cryptographic Terms and Concepts (9:00)
Practice Test
Test Instructions
CompTIA Security+ Practice Test
Where To Go From Here?
Thank You! (1:17)
Review This Course!
Become An Alumni
Learning Guideline
ZTM Events Every Month
LinkedIn Endorsements
Information Gathering for Incident Response
This lecture is available exclusively for ZTM Academy members.
If you're already a member,
you'll need to login
.
Join ZTM To Unlock All Lectures