Setup Menus in Admin Panel

  • LOGIN
  • No products in the cart.

Course Name: CompTIA Security+ SY0-401

Descriptions

Course Curriculum

Section 1: Course Introduction
Introduction 00:00:00
Course Introduction 00:00:00
Instructor Introduction 00:00:00
Section 2: Security Fundamentals
Introduction 00:00:00
Topic A The Information Security Cycle 00:00:00
What Is Information Security 00:00:00
What to Protect 00:00:00
Goals of Security 00:00:00
Risk 00:00:00
Threats 00:00:00
A Vulnerability 00:00:00
Intrusions 00:00:00
Attacks 00:00:00
Controls 00:00:00
Types of Controls 00:00:00
The Security Management Process 00:00:00
Topic B Information Security Controls 00:00:00
The CIA Triad 00:00:00
Non-repudiation 00:00:00
Identification 00:00:00
Authentication 00:00:00
Authentication Factors 00:00:00
Authorization 00:00:00
Access Control 00:00:00
Access Control Models 00:00:00
Accounting and Auditing 00:00:00
Common Security Practices 00:00:00
Implicit Deny 00:00:00
Least Privilege 00:00:00
Separation of Duties 00:00:00
Job Rotation 00:00:00
Mandatory Vacation 00:00:00
Time of Day Restrictions 00:00:00
Privilege Management 00:00:00
Topic C Authentication Methods 00:00:00
User Name Password Authentication 00:00:00
Tokens 00:00:00
Biometrics 00:00:00
Geolocation 00:00:00
Keystroke Authentication 00:00:00
Multi-factor Authentication 00:00:00
Mutual Authentication 00:00:00
Topic D Cryptography Fundamentals 00:00:00
Cryptography 00:00:00
Encryption and Decryption 00:00:00
Ciphers 00:00:00
Cipher Types 00:00:00
Encryption and Security Goals 00:00:00
Demo – Exploring Public Key Cryptography 00:00:00
Steganography 00:00:00
Demo – Sharing a Secret Message with Steganography 00:00:00
A Key 00:00:00
Hashing Encryption 00:00:00
Hashing Encryption Algorithms 00:00:00
Demo – Calculating Hashes 00:00:00
Symmetric Encryption 00:00:00
Symmetric Encryption Algorithms 00:00:00
Asymmetric Encryption 00:00:00
Asymmetric Encryption Techniques 00:00:00
Key Exchange 00:00:00
Digital Signatures 00:00:00
Cipher Suites 00:00:00
Session Keys 00:00:00
Key Stretching 00:00:00
Topic E Security Policy Fundamentals 00:00:00
A Security Policy 00:00:00
Security Policy Components 00:00:00
Common Security Policy Types 00:00:00
Group Policy 00:00:00
Security Document Categories 00:00:00
Change Management 00:00:00
Documentation Handling Measures 00:00:00
Section Review 00:00:00
Section 3: Identifying Security Threats and Vulnerabilities
Introduction 00:00:00
Topic ASocial_Engineering 00:00:00
Social Engineering Attacks 00:00:00
Social Engineering Effectiveness 00:00:00
Types of Social Engineering 00:00:00
Hackers and Attackers 00:00:00
Categories of Attackers 00:00:00
Demo 00:00:00
Topic BMalware 00:00:00
Malicious Code Attacks 00:00:00
Viruses 00:00:00
Demo – Installing Antivirus Software 00:00:00
Worms 00:00:00
Adware 00:00:00
Spyware 00:00:00
Demo – Scanning Your System for Spyware 00:00:00
Trojan Horses 00:00:00
Rootkits 00:00:00
Logic Bombs 00:00:00
Botnets 00:00:00
Ransomware 00:00:00
Polymorphic Malware 00:00:00
Armored Viruses 00:00:00
Topic C Software-Based Threats 00:00:00
Software Attacks 00:00:00
Password Attacks 00:00:00
Types of Password Attacks 00:00:00
Backdoor Attacks 00:00:00
Application Attacks 00:00:00
Types of Application Attacks Part1 00:00:00
Types of Application Attacks Part2 00:00:00
Demo – Managing Application Security 00:00:00
Topic D Network-Based Threats 00:00:00
TCP IP Basics 00:00:00
Port Scanning Attacks 00:00:00
Eavesdropping Attacks 00:00:00
Man-in-the-Middle Attacks 00:00:00
Replay Attacks 00:00:00
Social Network Attacks 00:00:00
DoS Attacks 00:00:00
DDoS Attacks 00:00:00
Types of DoS Attacks 00:00:00
Session Hijacking 00:00:00
P2P Attacks 00:00:00
ARP Poisoning 00:00:00
Transitive Access Attacks 00:00:00
DNS Vulnerabilities 00:00:00
Topic E Wireless Threats and Vulnerabilities 00:00:00
Wireless Security 00:00:00
Demo – Configuring a Wireless Access Point 00:00:00
Demo – Configuring a Wireless Client 00:00:00
Rogue Access Points 00:00:00
Evil Twins 00:00:00
Jamming 00:00:00
Bluejacking 00:00:00
Bluesnarfing 00:00:00
Near Field Communication 00:00:00
War Driving and War Chalking 00:00:00
IV Attacks 00:00:00
Packet Sniffing 00:00:00
Wireless Replay Attacks 00:00:00
Sinkhole Attacks 00:00:00
WEP and WPA Attacks 00:00:00
WPS Attacks 00:00:00
Topic F Physical Threats and Vulnerabilities 00:00:00
Physical Security 00:00:00
Physical Security Threats and Vulnerabilities 00:00:00
Hardware Attacks 00:00:00
Environmental Threats and Vulnerabilities 00:00:00
Section Review 00:00:00
Section 4: Managing Data Application and Host Security
Introduction 00:00:00
Topic A Manage Data Security 00:00:00
Layered Security 00:00:00
Defense in Depth 00:00:00
What Is Data Security 00:00:00
Data Security Vulnerabilities 00:00:00
Data Storage Methods 00:00:00
Data Encryption Methods 00:00:00
Hardware -Based Encryption Devices 00:00:00
Types of Hardware -Based Encryption Devices 00:00:00
Data States 00:00:00
Permissions and Access Control Lists 00:00:00
Handling Big Data 00:00:00
Data Policies 00:00:00
Guidelines for Managing Data Security 00:00:00
Demo – Managing Data Security 00:00:00
Topic B Manage Application Security 00:00:00
What Is Application Security 00:00:00
Patch Management 00:00:00
Application Security Methods 00:00:00
Input Validation 00:00:00
Input Validation Vulnerabilities 00:00:00
Client -Side and Server -Side Validation 00:00:00
Error and Exception Handling 00:00:00
XSS 00:00:00
XSRF 00:00:00
Cross-Site Attack Prevention Methods 00:00:00
Fuzzing 00:00:00
Web Browser Security 00:00:00
Demo – Configuring a Web Browser 00:00:00
Guidelines for Establishing Web Browser Security 00:00:00
NoSQL Databases 00:00:00
Database Security 00:00:00
Guidelines for Managing Application Security 00:00:00
Topic C Manage Device and Host Security 00:00:00
Hardening 00:00:00
Demo – Hardening a Server 00:00:00
Operating System Security 00:00:00
Operating System Security Settings 00:00:00
TCB 00:00:00
Security Baselines 00:00:00
Software Updates 00:00:00
Application Blacklisting and Whitelisting 00:00:00
Logging 00:00:00
Auditing 00:00:00
Demo – Implementing Auditing 00:00:00
Anti-malware Software 00:00:00
Types of Anti-malware Software 00:00:00
Virtualization Security Techniques 00:00:00
Hardware Security Controls 00:00:00
Non-standard Hosts 00:00:00
Security Controls for Non-standard Hosts 00:00:00
Strong Passwords 00:00:00
Guidelines for Establishing Device & Host Security Part1 00:00:00
Guidelines for Establishing Device & Host Security Part2 00:00:00
Topic D Manage Mobile Security 00:00:00
Mobile Device Types 00:00:00
Mobile Device Vulnerabilities 00:00:00
Mobile Device Security Controls 00:00:00
Mobile Application Security Controls 00:00:00
BYOD Controls 00:00:00
Guidelines for Managing Mobile Security 00:00:00
Section Review 00:00:00
Section 5: Implementing Network Security
Introduction 00:00:00
Topic A Configure Security Parameters on Network Devices and Technologies 00:00:00
Network Components 00:00:00
Network Devices 00:00:00
Demo – Configuring Firewall Parameters 00:00:00
Network Analysis Tools 00:00:00
IDS 00:00:00
NIDS 00:00:00
Demo – Configuring a Network Intrusion Detection System 00:00:00
Wireless IDS 00:00:00
IPS 00:00:00
NIPS 00:00:00
WIPS 00:00:00
Types of Network Monitoring Systems 00:00:00
VPN 00:00:00
VPN Concentrator 00:00:00
Web Security Gateways 00:00:00
Topic B Network Design Elements and Components 00:00:00
NAC 00:00:00
DMZ 00:00:00
VLAN 00:00:00
Subnet 00:00:00
NAT 00:00:00
Remote Access 00:00:00
Telephony Components 00:00:00
Virtualization 00:00:00
Cloud Computing 00:00:00
Cloud Computing Deployment Models 00:00:00
Cloud Computing Service Types 00:00:00
Topic C – Implement Networking Protocols and Services 00:00:00
OSI Model 00:00:00
OSI Model and Security 00:00:00
TCP IP 00:00:00
DNS 00:00:00
HTTP 00:00:00
SSL TLS 00:00:00
HTTPS 00:00:00
SSH 00:00:00
SNMP 00:00:00
ICMP 00:00:00
IPSec 00:00:00
Demo – Securing Network Traffic Using IP Security 00:00:00
iSCSI 00:00:00
Fibre Channel 00:00:00
FCoE 00:00:00
Telnet 00:00:00
NetBIOS 00:00:00
File Transfer Protocols 00:00:00
Ports and Port Ranges 00:00:00
Demo – Installing an IIS Web Server 00:00:00
Topic D Apply Secure Network Administration Principles 00:00:00
Rule-Based Management 00:00:00
Network Administration Security Methods 00:00:00
Unified Threat Management 00:00:00
Guidelines for Applying Network Security Administration Principles 00:00:00
Topic E Secure Wireless Traffic 00:00:00
Wireless Networks 00:00:00
Wireless Antenna Types 00:00:00
802.11 Standards 00:00:00
Wireless Security Protocols 00:00:00
VPNs and Open Wireless 00:00:00
Wireless Security Methods 00:00:00
Captive Portals 00:00:00
Site Surveys 00:00:00
Guidelines for Securing Wireless Traffic 00:00:00
Demo – Securing Wireless Traffic 00:00:00
Section Review 00:00:00
Section 6: Implementing Access Control Authentication and Account Management
Introduction 00:00:00
Topic A Access Control and Authentication Services 00:00:00
Directory Services 00:00:00
LDAP 00:00:00
LDAPS 00:00:00
Common Directory Services 00:00:00
Demo – Backing Up Active Directory 00:00:00
Remote Access Methods 00:00:00
Tunneling 00:00:00
Remote Access Protocols 00:00:00
HOTP 00:00:00
TOTP 00:00:00
PAP 00:00:00
CHAP 00:00:00
Guidelines for Securing Remote Access 00:00:00
PGP 00:00:00
RADIUS 00:00:00
TACACS 00:00:00
Kerberos 00:00:00
SAML 00:00:00
Topic B Implement Account Management Security Controls 00:00:00
Identity Management 00:00:00
Account Management 00:00:00
Account Privileges 00:00:00
Account Policy 00:00:00
Multiple Accounts 00:00:00
Shared Accounts 00:00:00
Account Federation 00:00:00
Account Management Security Controls 00:00:00
Demo – Account Management Security Controls 00:00:00
Credential Management 00:00:00
Group Policy 00:00:00
Guidelines for Implementing Account Management Security Controls 00:00:00
Section Review 00:00:00
Section 7: Managing Certificates
Introduction 00:00:00
Topic A Install a CA Hierarchy 00:00:00
Digital Certificates 00:00:00
Certificate Authentication 00:00:00
PKI 00:00:00
PKI Components 00:00:00
CA Hierarchies 00:00:00
The Root CA 00:00:00
Public and Private Roots 00:00:00
Subordinate CAs 00:00:00
Offline Root CAs 00:00:00
CA Hierarchy Design Options 00:00:00
Demo – Installing a Certificate Authority 00:00:00
Topic B Enroll Certificates 00:00:00
The Certificate Enrollment Process 00:00:00
Demo – Enrolling for Certificates 00:00:00
The Certificate Life Cycle 00:00:00
Certificate Life Cycle Management 00:00:00
Topic C Secure Network Traffic by Using Certificates 00:00:00
The SSL Enrollment Process 00:00:00
Topic D Renew Certificates 00:00:00
Certificate Renewal 00:00:00
Topic E Back Up and Restore Certificates and Private Keys 00:00:00
Private Key Protection Methods 00:00:00
Key Escrow 00:00:00
Private Key Restoration Methods 00:00:00
The Private Key Replacement Process 00:00:00
Topic F Revoke Certificates 00:00:00
Certificate Revocation 00:00:00
Demo – Revoking Certificates 00:00:00
A CRL 00:00:00
OCSP 00:00:00
Section Review 00:00:00
Section 8: Implementing Compliance and Operational Security
Introduction 00:00:00
Topic A Physical Security 00:00:00
Physical Security Controls 00:00:00
Physical Security Control Types 00:00:00
Environmental Exposures 00:00:00
Environmental Controls 00:00:00
Environmental Monitoring 00:00:00
Safety 00:00:00
Topic B Legal Compliance 00:00:00
Compliance Laws and Regulations 00:00:00
Legal Requirements 00:00:00
Types of Legal Requirements 00:00:00
Forensic Requirements 00:00:00
Topic C Security Awareness and Training 00:00:00
Security Policy Awareness 00:00:00
Role-Based Training 00:00:00
PII 00:00:00
Classification of Information 00:00:00
The Employee Education Process 00:00:00
User Security Responsibilities 00:00:00
Validation of Training Effectiveness 00:00:00
Topic D Integrate Systems and Data with Third Parties 00:00:00
Business Partners 00:00:00
Social Media Networks and Applications 00:00:00
Interoperability Agreements 00:00:00
Risk Awareness 00:00:00
Data Sharing and Backups 00:00:00
Guidelines for Securely Integrating Systems and Data with Third Parties 00:00:00
Section Review 00:00:00
Section 9: Risk Management
Introduction 00:00:00
Topic A Risk Analysis 00:00:00
Risk Management 00:00:00
Security Assessment Types 00:00:00
Risk Types 00:00:00
Components of Risk Analysis 00:00:00
Phases of Risk Analysis 00:00:00
Risk Analysis Methods 00:00:00
Risk Calculation 00:00:00
Risk Response Strategies 00:00:00
Risk Mitigation and Control Types 00:00:00
Topic B Implement Vulnerability Assessment Tools and Techniques 00:00:00
Vulnerability Assessment Techniques 00:00:00
Vulnerability Assessment Tools 00:00:00
Topic C Scan for Vulnerabilities 00:00:00
The Hacking Process 00:00:00
Ethical Hacking 00:00:00
Vulnerability Scanning and Penetration Testing 00:00:00
Types of Vulnerability Scans 00:00:00
Demo – Scanning for Port Vulnerabilities 00:00:00
Demo – Scanning for Password Vulnerabilities 00:00:00
Box Testing Methods 00:00:00
Security Utilities 00:00:00
Topic D Mitigation and Deterrent Techniques 00:00:00
Security Posture 00:00:00
DLP 00:00:00
Demo – Capturing Network Data 00:00:00
Detection Controls and Prevention Controls 00:00:00
Risk Mitigation Strategies 00:00:00
Types of Mitigation and Deterrent Techniques 00:00:00
Failsafe, Failsecure, and Failopen 00:00:00
Section Review 00:00:00
Section 10: Troubleshooting and Managing Security Incidents
Introduction 00:00:00
Topic A Respond to Security Incidents 00:00:00
Security Incident Management 00:00:00
Computer Crime 00:00:00
An IRP 00:00:00
First Responders 00:00:00
Chain of Custody 00:00:00
Computer Forensics 00:00:00
Order of Volatility 00:00:00
Basic Forensic Process 00:00:00
Basic Forensic Response Procedures for IT 00:00:00
Big Data Analysis 00:00:00
Guidelines for Responding to Security Incidents 00:00:00
Topic B Recover from a Security Incident 00:00:00
Basic Incident Recovery Process 00:00:00
Damage Assessment 00:00:00
Recovery Methods 00:00:00
An Incident Report 00:00:00
Guidelines for Recovering from a Security Incident Part1 00:00:00
Guidelines for Recovering from a Security Incident Part2 00:00:00
Guidelines for Recovering from a Security Incident Part3 00:00:00
Section Review 00:00:00
Section 11: Business Continuity and Disaster Recovery Planning
Introduction 00:00:00
Topic A Business Continuity 00:00:00
A BCP 00:00:00
BIA 00:00:00
MTD 00:00:00
RPO 00:00:00
RTO 00:00:00
Continuity of Operations Plan 00:00:00
Alternate Sites 00:00:00
IT Contingency Planning 00:00:00
Succession Planning 00:00:00
Business Continuity Testing Methods 00:00:00
Topic B Plan for Disaster Recovery 00:00:00
A DRP 00:00:00
Fault Tolerance 00:00:00
Redundancy Measures 00:00:00
Demo – Creating a RAID Array Through Software 00:00:00
High Availability 00:00:00
Disaster Recovery Testing and Maintenance 00:00:00
Guidelines for Planning for Disaster Recovery 00:00:00
Topic C Execute DRPs and Procedures 00:00:00
The Disaster Recovery Process 00:00:00
Recovery Team 00:00:00
Secure Recovery 00:00:00
Backup Types and Recovery Plans 00:00:00
A Backout Contingency Plan 00:00:00
Secure Backups 00:00:00
Backup Storage Locations 00:00:00
Guidelines for Executing DRPs and Procedures 00:00:00
Section Review 00:00:00
Course Closure 00:00:00
Online Learning Thailand.
X