Autoplay
Autocomplete
Previous Lesson
Complete and Continue
CompTIA Security+
Let's Get Started
001 Welcome to Security+ (6:52)
002 Infrastructure Security Devices (24:02)
003 Application and Traffic Analysis (10:27)
004 Network Segmentation and Separation with VLANs (14:02)
005 ACL Case Study (16:11)
006 Design Considerations (20:20)
007 NAT and PAT Case Study (12:21)
008 Firewall and Switch Protection Mechanisms (15:39)
009 Virtualization Overview (14:14)
010 IPsec_ Protocols_ and Well-known Ports (18:26)
011 ICMP and a Few More Protocols (16:18)
012 Security for WiFi (25:38)
013 Risk Overview (24:59)
014 Risk Calculation (18:38)
015 Attack Vectors_ Risk Management_ and Recovery (11:19)
016 Third-Party Risk from Integration (10:46)
017 Change Management and Account Auditing (15:56)
018 Data Loss Prevention (DLP) (11:02)
019 Forensics (19:43)
020 Incident Response Concepts (11:45)
021 Security Awareness_ RBAC_ and Data Labeling (14:42)
022 Passwords_ Best Practices_ and Standards (14:41)
023 Environmental Controls (10:46)
024 Physical Security (12:58)
025 Business Continuity (17:34)
026 Fault Tolerance (18:09)
027 Controls for Confidentiality (13:31)
028 Tools and Controls for Data Integrity (18:35)
029 Availability and Safety (5:39)
030 Malware_ Adware - Spyware (11:40)
031 Trojans_ Backdoors_ and More Malware (18:35)
032 Attack Types MITM - Spear Fishing (19:29)
033 Attack Types_ Xmas - Client Side (14:52)
034 Password Attacks and Watering Holes (13:47)
035 Social Engineering Threats (13:11)
036 Vishing and Why Social Engineering Works (11:38)
037 Wireless Attacks (15:04)
038 Cross-site and Injection Attacks (17:27)
039 Application Attacks (12:39)
040 Monitoring and Device Hardening (19:05)
041 Baselines_ Detection_ and Reporting (10:27)
042 Analyzers and Scanners (20:20)
043 Discovering and Assessing Threats (15:41)
044 Penetration Testing (13:11)
045 Techniques for Securing Apps (10:43)
046 Application Security Controls (15:09)
047 Mobile Device Security Overview (19:05)
048 Host Security (11:37)
049 Hardware and Virtualization Security (12:33)
050 Data Security (10:50)
051 Securing Data with H_W_ Controls_ and Policy (10:40)
052 Security in Static Environments (14:42)
053 AAA Concepts (9:58)
054 Authentication Protocols and Services (18:33)
055 Multifactor Authentication (13:50)
056 Authentication Controls (19:22)
057 Controlling Access via Authorization (18:36)
058 Account Management (20:45)
059 Symmetric and Asymmetric Encryption (18:48)
060 Crypto Key Management (22:07)
061 Hashing and Encryption Protocols (19:29)
062 Comparing Cryptography Algorithms (17:02)
063 PKI Overview (14:55)
064 Certificate Warnings and Trust Models (10:11)
065 Layered Security Case Study (10:35)
066 Attack Types and Vectors (4:13)
067 Threat Actor Types and Ethics (5:26)
068 Reconnaissance Information Gathering Concepts (9:50)
069 Hacking Vocabulary and Terms (6:02)
070 Malware Concepts (9:08)
071 Network Scanning Overview (3:42)
072 Trojans (10:02)
073 Port Security (10:12)
074 Scanning Methodologies (8:48)
075 Sniffing Overview (11:44)
076 Vulnerability Scanning (7:56)
077 Social Engineering Overview (13:42)
078 System Hacking Stages and Goals (9:13)
079 Buffer Overflow (13:04)
080 OWASP BWAP (9:44)
081 Honeypots and Honeynets (11:08)
082 Centralized Identity Management (13:26)
083 SSO_ Kerberos_ and Security Threats (17:14)
084 Incident Response (11:56)
085 Penetration Testing Legally (10:06)
086 Case Study #1 (20:30)
Teach online with
029 Availability and Safety
Lesson content locked
If you're already enrolled,
you'll need to login
.
Enroll in Course to Unlock