CompTIA Security+ Video Course

SY0-501: CompTIA Security+

Your CompTIA SY0-501 exam is just around the corner, right? So, it's high time to find an effective preparation tool! Our training course is what you really need! This is a series of videos led by the experienced IT instructors who will provide you with a detailed overview of the SY0-501 certification test. Ace your CompTIA SY0-501 at the first attempt and obtain the CompTIA Security+ credential with ease.

# of Students
90
# of Lectures
222
Course Length
14 h
Course Rating
4.5
Price $32.99
Today $29.99

Curriculum for SY0-501 Video Course

Overview of Security

  Video Name Time
  1. Overview of Security 02:55
  2. CIA Triad 03:54
  3. AAA of Security 03:05
  4. Security Threats 02:57
  5. Mitigating Threats 02:28
  6. Hackers 04:53
  7. Threat Actors 03:12
  Video Name Time
  1. Malware 00:39
  2. Viruses 06:21
  3. Worms 02:09
  4. Trojans 02:48
  5. Demo: Viruses and Trojans 06:16
  6. Ransomware 02:30
  7. Spyware 02:39
  8. Rootkits 03:29
  9. Spam 02:56
  10. Summary of Malware 02:02
  Video Name Time
  1. Malware Infections 04:12
  2. Common Delivery Methods 03:23
  3. Botnets and Zombies 03:30
  4. Active Interception and Privilege Escalation 02:28
  5. Demo: Privilege Escalation 05:41
  6. Backdoors and Logic Bombs 03:48
  7. Symptoms of Infection 04:10
  8. Removing Malware 05:01
  9. Preventing Malware 05:56
  Video Name Time
  1. Security Applications and Devices 00:33
  2. Software Firewalls 04:16
  3. Demo: Software Firewalls 06:44
  4. IDS 05:03
  5. Pop-up Blockers 03:09
  6. Data Loss Prevention (DLP) 03:43
  7. Securing the BIOS 03:56
  8. Securing Storage Devices 03:26
  9. Disk Encryption 04:51
  Video Name Time
  1. Mobile Device Security 01:14
  2. Securing Wireless Devices 01:30
  3. Mobile Malware 06:19
  4. SIM Cloning & ID Theft 04:00
  5. Bluetooth Attacks 02:08
  6. Mobile Device Theft 03:10
  7. Security of Apps 05:06
  8. BYOD 04:56
  9. Hardening Mobile Devices 03:51
  Video Name Time
  1. Hardening 01:47
  2. Unnecessary Applications 03:10
  3. Restricting Applications 02:56
  4. Demo: Unnecessary Services 05:35
  5. Trusted Operating System 01:57
  6. Updates and Patches 03:26
  7. Patch Management 03:49
  8. Group Policies 02:33
  9. Demo: Group Policies 04:06
  10. File Systems and Hard Drives 03:18
  Video Name Time
  1. Virtualization 02:07
  2. Hypervisors 02:37
  3. Demo: How to create a VM 04:39
  4. Threats to VMs 03:43
  5. Securing VMs 03:47
  6. Demo: Securing VMs 04:41
  Video Name Time
  1. Application Security 01:43
  2. Web Browser Security 06:39
  3. Web Browser Concerns 03:19
  4. Demo: Web Browser Configuration 05:20
  5. Securing Applications 04:49
  Video Name Time
  1. Software Development 08:34
  2. SDLC Principles 06:22
  3. Testing Methods 06:59
  4. Software Vulnerabilities and Exploits 02:28
  5. Buffer Overflows 06:15
  6. Demo: Buffer Overflow Attack 06:25
  7. XSS and XSRF 03:07
  8. SQL Injection 06:25
  9. Demo: SQL Injection 07:13
  Video Name Time
  1. Network Security 00:44
  2. The OSI Model 06:00
  3. Switches 03:32
  4. Routers 02:27
  5. Network Zones 03:26
  6. Network Access Control 02:40
  7. VLANs 01:30
  8. Subnetting 01:51
  9. Network Address Translation 02:26
  10. Telephony 05:58
  Video Name Time
  1. Perimeter Security 00:46
  2. Firewalls 08:01
  3. Demo: SOHO Firewall 04:04
  4. Proxy Servers 04:12
  5. Honeypots and Honeynets 01:22
  6. Data Loss Prevention 01:35
  7. NIDS and NIPS 04:11
  8. Unified Threat Management 01:52
  Video Name Time
  1. Cloud Computing 03:29
  2. Cloud Types 02:51
  3. As a Service 07:04
  4. Cloud Security 02:25
  5. Defending Servers 04:32
  Video Name Time
  1. Network Attacks 00:38
  2. Ports and Protocols 00:54
  3. Memorization of Ports 11:30
  4. Unnecessary Ports 03:21
  5. Denial of Service 07:56
  6. DDoS 01:36
  7. Stopping a DDoS 02:27
  8. Spoofing 01:16
  9. Hijacking 03:45
  10. Replay Attack 01:27
  11. Demo: Null Sessions 02:24
  12. Transitive Attacks 01:24
  13. DNS Attacks 04:33
  14. ARP Poisoning 01:30
  Video Name Time
  1. Securing Networks 00:49
  2. Securing Network Devices 06:43
  3. Securing Network Media 08:48
  4. Securing WiFi Devices 04:22
  5. Wireless Encryption 05:30
  6. Wireless Access Points 06:11
  7. Wireless Attacks 04:15
  8. Demo: Wireless Attack 06:58
  9. Other Wireless Technologies 06:02
  Video Name Time
  1. Physical Security 01:30
  2. Surveillance 02:51
  3. Door Locks 03:47
  4. Demo: Lock Picking 01:36
  5. Biometric Readers 04:15
  Video Name Time
  1. Facilities Security 00:36
  2. Fire Suppression 06:21
  3. HVAC 02:23
  4. Shielding 02:34
  5. Vehicles 02:03
  Video Name Time
  1. Authentication 05:53
  2. Authentication Models 05:17
  3. 802.1x 03:44
  4. LDAP and Kerberos 02:26
  5. Remote Desktop Services 01:51
  6. Remote Access Service 02:03
  7. VPN 03:02
  8. RADIUS vs TACACS+ 02:18
  9. Authentication Summary 02:04
  Video Name Time
  1. Access Control 00:50
  2. Access Control Models 08:14
  3. Best Practices 05:44
  4. Users and Groups 09:12
  5. Permissions 03:41
  6. Usernames and Passwords 02:36
  7. Demo: Policies 04:34
  8. User Account Control 01:53
  Video Name Time
  1. Risk Assessments 08:33
  2. Qualitative Risk 04:06
  3. Quantitative Risk 05:27
  4. Methodologies 02:49
  5. Security Controls 06:49
  6. Vulnerability Management 07:50
  7. Penetration Testing 04:26
  8. OVAL 01:34
  9. Vulnerability Assessments 06:52
  10. Demo: Nmap Scanning 08:50
  11. Demo: Vulnerability Scanning 09:33
  12. Password Analysis 05:54
  13. Demo: Password Cracking 02:36
  Video Name Time
  1. Monitoring Types 02:54
  2. Performance Baselining 04:35
  3. Protocol Analyzers 02:58
  4. SNMP 03:40
  5. Demo: Analytical Tools 04:27
  6. Auditing 01:54
  7. Demo: Auditing Files 03:53
  8. Logging 03:39
  9. Log Files 05:14
  10. SIEM 02:54
  Video Name Time
  1. Cryptography 04:56
  2. Symmetric vs Asymmetric 06:12
  3. Symmetric Algorithms 04:56
  4. Public Key Cryptography 03:09
  5. Asymmetric Algorithms 03:44
  6. Pretty Good Privacy 01:46
  7. Key Management 02:11
  8. One-Time Pad 04:18
  9. Hashing 08:27
  10. Demo: Hashing 03:04
  11. Hashing Attacks 03:15
  12. Increasing Hash Security 01:26
  Video Name Time
  1. Public Key Infrastructure 03:53
  2. Digital Certificates 06:42
  3. Demo: Certificates 03:31
  4. Certificate Authorities 04:12
  5. Web of Trust 02:35
  Video Name Time
  1. Security Protocols 00:21
  2. S/MIME 01:29
  3. SSL and TLS 05:48
  4. SSH 02:28
  5. VPN Protocols 06:37
  6. Demo: Setting up a VPN 01:37
  Video Name Time
  1. Planning for the Worst 02:09
  2. Redundant Power 03:08
  3. Backup Power 03:06
  4. Data Redundancy 04:39
  5. Demo: RAIDs 03:35
  6. Network Redundancy 02:04
  7. Server Redundancy 01:42
  8. Redundant Sites 02:20
  9. Data Backup 02:54
  10. Tape Rotation 03:52
  11. Disaster Recovery Plan 05:38
  Video Name Time
  1. Social Engineering 00:52
  2. Demo: Pretexting 04:14
  3. Insider Threat 02:10
  4. Phishing 01:13
  5. More Social Engineering 04:00
  6. User Education 04:44
  Video Name Time
  1. Policies and Procedures 05:53
  2. Data Classifications 06:42
  3. PII and PHI 06:19
  4. Security Policies 10:19
  5. User Education 04:02
  6. Vendor Relationships 07:52
  7. Disposal Policies 05:04
  8. Incident Response Procedures 04:36
  9. Data Collection Procedures 03:11
  10. Demo: Disk Imaging 06:56
  11. IT Security Frameworks 03:18
  Video Name Time
  1. Exam Tricks 04:09

Student Feedback

5 Stars
4 Stars
3 Stars
2 Stars
1 Star
4.5
Rating: 4.5
Overall Rating: Good.

Similar Courses

Only Registered Members can View Training Courses

Please fill out your email address below in order to view Training Courses. Registration is Free and Easy, You Simply need to provide an email address.

  • Trusted by 1.2M IT Certification Candidates Every Month
  • Hundreds Hours of Videos
  • Instant download After Registration

Already Member? Click here to Login

A confirmation link will be sent to this email address to verify your login

1200+ IT Certification Exams available: Get a free sample of any exam right now!
Try Free Demo

Try Free Demo

  • ABA
  • ACAMS
  • ACFE
  • ACI
  • ACSM
  • Adobe
  • AHIMA
  • AHIP
  • AHLEI
  • AICPA
  • AIWMI
  • Alfresco
  • AMA
  • Amazon
  • AndroidATC
  • APBM
  • API
  • APICS
  • Apple
  • Arista
  • Aruba
  • ASIS
  • ASQ
  • Atlassian
  • Autodesk
  • Avaya
  • Axis Communications
  • BACB
  • BCS
  • BICSI
  • Blockchain
  • Blue Coat
  • Blue Prism
  • Brocade
  • C++ Institute
  • CA Technologies
  • Checkpoint
  • CIMA
  • Cisco
  • Citrix
  • CIW
  • Cloudera
  • CompTIA
  • CSA
  • CWNP
  • CyberArc
  • Dell
  • DMI
  • DSCI
  • ECCouncil
  • EMC
  • Esri
  • Exin
  • Extreme Networks
  • F5
  • FileMaker
  • FINRA
  • Fortinet
  • GAQM
  • GARP
  • Genesys
  • GIAC
  • Google
  • Guidance Software
  • H3C
  • HFMA
  • HIPAA
  • Hitachi
  • HP
  • HRCI
  • Huawei
  • IAPP
  • IBM
  • IFPUG
  • IIA
  • IIBA
  • Informatica
  • Isaca
  • iSAQB
  • ISC
  • iSQI
  • ISTQB
  • ITIL
  • Juniper
  • Linux Foundation
  • Logical Operations
  • LPI
  • Magento
  • Marketo
  • McAfee
  • Microsoft
  • Mulesoft
  • NACVA
  • NCMA
  • Network Appliance
  • NI
  • Nokia
  • Novell
  • Nuage Networks
  • OMG
  • Palo Alto Networks
  • Pegasystems
  • PEOPLECERT
  • PMI
  • PRINCE2
  • Python Institute
  • QlikView
  • RedHat
  • Riverbed
  • RSA
  • Salesforce
  • SANS
  • SAP
  • SAS Institute
  • Scrum
  • SDI
  • ServiceNow
  • Six Sigma
  • SNIA
  • SOA
  • Software Certifications
  • SolarWinds
  • Splunk
  • SpringSource
  • Symantec
  • The Open Group
  • Tibco
  • VCE
  • Veeam
  • Veritas
  • Vmedu
  • VMware
  • WatchGuard
  • WorldatWork
  • Zend
Next Step
Next Step

Try Free Demo

  • CompTIA
Next Step
Next Step

Summer Sale! Get 25% Discount on All Your Purchases!

Passguide Products

Enter Your Email Address to Receive Your 25%
OFF
Discount Code Plus... Our Exclusive Weekly Deals

* We value your privacy. We will not rent or sell your email address