SY0-501: CompTIA Security+
Your CompTIA SY0-501 exam is just around the corner, right? So, it's high time to find an effective preparation tool! Our training course is what you really need! This is a series of videos led by the experienced IT instructors who will provide you with a detailed overview of the SY0-501 certification test. Ace your CompTIA SY0-501 at the first attempt and obtain the CompTIA Security+ credential with ease.
Curriculum for SY0-501 Video Course
Overview of Security
Video Name | Time | |
---|---|---|
1. Overview of Security | 02:55 | |
2. CIA Triad | 03:54 | |
3. AAA of Security | 03:05 | |
4. Security Threats | 02:57 | |
5. Mitigating Threats | 02:28 | |
6. Hackers | 04:53 | |
7. Threat Actors | 03:12 |
Video Name | Time | |
---|---|---|
1. Malware | 00:39 | |
2. Viruses | 06:21 | |
3. Worms | 02:09 | |
4. Trojans | 02:48 | |
5. Demo: Viruses and Trojans | 06:16 | |
6. Ransomware | 02:30 | |
7. Spyware | 02:39 | |
8. Rootkits | 03:29 | |
9. Spam | 02:56 | |
10. Summary of Malware | 02:02 |
Video Name | Time | |
---|---|---|
1. Malware Infections | 04:12 | |
2. Common Delivery Methods | 03:23 | |
3. Botnets and Zombies | 03:30 | |
4. Active Interception and Privilege Escalation | 02:28 | |
5. Demo: Privilege Escalation | 05:41 | |
6. Backdoors and Logic Bombs | 03:48 | |
7. Symptoms of Infection | 04:10 | |
8. Removing Malware | 05:01 | |
9. Preventing Malware | 05:56 |
Video Name | Time | |
---|---|---|
1. Security Applications and Devices | 00:33 | |
2. Software Firewalls | 04:16 | |
3. Demo: Software Firewalls | 06:44 | |
4. IDS | 05:03 | |
5. Pop-up Blockers | 03:09 | |
6. Data Loss Prevention (DLP) | 03:43 | |
7. Securing the BIOS | 03:56 | |
8. Securing Storage Devices | 03:26 | |
9. Disk Encryption | 04:51 |
Video Name | Time | |
---|---|---|
1. Mobile Device Security | 01:14 | |
2. Securing Wireless Devices | 01:30 | |
3. Mobile Malware | 06:19 | |
4. SIM Cloning & ID Theft | 04:00 | |
5. Bluetooth Attacks | 02:08 | |
6. Mobile Device Theft | 03:10 | |
7. Security of Apps | 05:06 | |
8. BYOD | 04:56 | |
9. Hardening Mobile Devices | 03:51 |
Video Name | Time | |
---|---|---|
1. Hardening | 01:47 | |
2. Unnecessary Applications | 03:10 | |
3. Restricting Applications | 02:56 | |
4. Demo: Unnecessary Services | 05:35 | |
5. Trusted Operating System | 01:57 | |
6. Updates and Patches | 03:26 | |
7. Patch Management | 03:49 | |
8. Group Policies | 02:33 | |
9. Demo: Group Policies | 04:06 | |
10. File Systems and Hard Drives | 03:18 |
Video Name | Time | |
---|---|---|
1. Virtualization | 02:07 | |
2. Hypervisors | 02:37 | |
3. Demo: How to create a VM | 04:39 | |
4. Threats to VMs | 03:43 | |
5. Securing VMs | 03:47 | |
6. Demo: Securing VMs | 04:41 |
Video Name | Time | |
---|---|---|
1. Application Security | 01:43 | |
2. Web Browser Security | 06:39 | |
3. Web Browser Concerns | 03:19 | |
4. Demo: Web Browser Configuration | 05:20 | |
5. Securing Applications | 04:49 |
Video Name | Time | |
---|---|---|
1. Software Development | 08:34 | |
2. SDLC Principles | 06:22 | |
3. Testing Methods | 06:59 | |
4. Software Vulnerabilities and Exploits | 02:28 | |
5. Buffer Overflows | 06:15 | |
6. Demo: Buffer Overflow Attack | 06:25 | |
7. XSS and XSRF | 03:07 | |
8. SQL Injection | 06:25 | |
9. Demo: SQL Injection | 07:13 |
Video Name | Time | |
---|---|---|
1. Network Security | 00:44 | |
2. The OSI Model | 06:00 | |
3. Switches | 03:32 | |
4. Routers | 02:27 | |
5. Network Zones | 03:26 | |
6. Network Access Control | 02:40 | |
7. VLANs | 01:30 | |
8. Subnetting | 01:51 | |
9. Network Address Translation | 02:26 | |
10. Telephony | 05:58 |
Video Name | Time | |
---|---|---|
1. Perimeter Security | 00:46 | |
2. Firewalls | 08:01 | |
3. Demo: SOHO Firewall | 04:04 | |
4. Proxy Servers | 04:12 | |
5. Honeypots and Honeynets | 01:22 | |
6. Data Loss Prevention | 01:35 | |
7. NIDS and NIPS | 04:11 | |
8. Unified Threat Management | 01:52 |
Video Name | Time | |
---|---|---|
1. Cloud Computing | 03:29 | |
2. Cloud Types | 02:51 | |
3. As a Service | 07:04 | |
4. Cloud Security | 02:25 | |
5. Defending Servers | 04:32 |
Video Name | Time | |
---|---|---|
1. Network Attacks | 00:38 | |
2. Ports and Protocols | 00:54 | |
3. Memorization of Ports | 11:30 | |
4. Unnecessary Ports | 03:21 | |
5. Denial of Service | 07:56 | |
6. DDoS | 01:36 | |
7. Stopping a DDoS | 02:27 | |
8. Spoofing | 01:16 | |
9. Hijacking | 03:45 | |
10. Replay Attack | 01:27 | |
11. Demo: Null Sessions | 02:24 | |
12. Transitive Attacks | 01:24 | |
13. DNS Attacks | 04:33 | |
14. ARP Poisoning | 01:30 |
Video Name | Time | |
---|---|---|
1. Securing Networks | 00:49 | |
2. Securing Network Devices | 06:43 | |
3. Securing Network Media | 08:48 | |
4. Securing WiFi Devices | 04:22 | |
5. Wireless Encryption | 05:30 | |
6. Wireless Access Points | 06:11 | |
7. Wireless Attacks | 04:15 | |
8. Demo: Wireless Attack | 06:58 | |
9. Other Wireless Technologies | 06:02 |
Video Name | Time | |
---|---|---|
1. Physical Security | 01:30 | |
2. Surveillance | 02:51 | |
3. Door Locks | 03:47 | |
4. Demo: Lock Picking | 01:36 | |
5. Biometric Readers | 04:15 |
Video Name | Time | |
---|---|---|
1. Facilities Security | 00:36 | |
2. Fire Suppression | 06:21 | |
3. HVAC | 02:23 | |
4. Shielding | 02:34 | |
5. Vehicles | 02:03 |
Video Name | Time | |
---|---|---|
1. Authentication | 05:53 | |
2. Authentication Models | 05:17 | |
3. 802.1x | 03:44 | |
4. LDAP and Kerberos | 02:26 | |
5. Remote Desktop Services | 01:51 | |
6. Remote Access Service | 02:03 | |
7. VPN | 03:02 | |
8. RADIUS vs TACACS+ | 02:18 | |
9. Authentication Summary | 02:04 |
Video Name | Time | |
---|---|---|
1. Access Control | 00:50 | |
2. Access Control Models | 08:14 | |
3. Best Practices | 05:44 | |
4. Users and Groups | 09:12 | |
5. Permissions | 03:41 | |
6. Usernames and Passwords | 02:36 | |
7. Demo: Policies | 04:34 | |
8. User Account Control | 01:53 |
Video Name | Time | |
---|---|---|
1. Risk Assessments | 08:33 | |
2. Qualitative Risk | 04:06 | |
3. Quantitative Risk | 05:27 | |
4. Methodologies | 02:49 | |
5. Security Controls | 06:49 | |
6. Vulnerability Management | 07:50 | |
7. Penetration Testing | 04:26 | |
8. OVAL | 01:34 | |
9. Vulnerability Assessments | 06:52 | |
10. Demo: Nmap Scanning | 08:50 | |
11. Demo: Vulnerability Scanning | 09:33 | |
12. Password Analysis | 05:54 | |
13. Demo: Password Cracking | 02:36 |
Video Name | Time | |
---|---|---|
1. Monitoring Types | 02:54 | |
2. Performance Baselining | 04:35 | |
3. Protocol Analyzers | 02:58 | |
4. SNMP | 03:40 | |
5. Demo: Analytical Tools | 04:27 | |
6. Auditing | 01:54 | |
7. Demo: Auditing Files | 03:53 | |
8. Logging | 03:39 | |
9. Log Files | 05:14 | |
10. SIEM | 02:54 |
Video Name | Time | |
---|---|---|
1. Cryptography | 04:56 | |
2. Symmetric vs Asymmetric | 06:12 | |
3. Symmetric Algorithms | 04:56 | |
4. Public Key Cryptography | 03:09 | |
5. Asymmetric Algorithms | 03:44 | |
6. Pretty Good Privacy | 01:46 | |
7. Key Management | 02:11 | |
8. One-Time Pad | 04:18 | |
9. Hashing | 08:27 | |
10. Demo: Hashing | 03:04 | |
11. Hashing Attacks | 03:15 | |
12. Increasing Hash Security | 01:26 |
Video Name | Time | |
---|---|---|
1. Public Key Infrastructure | 03:53 | |
2. Digital Certificates | 06:42 | |
3. Demo: Certificates | 03:31 | |
4. Certificate Authorities | 04:12 | |
5. Web of Trust | 02:35 |
Video Name | Time | |
---|---|---|
1. Security Protocols | 00:21 | |
2. S/MIME | 01:29 | |
3. SSL and TLS | 05:48 | |
4. SSH | 02:28 | |
5. VPN Protocols | 06:37 | |
6. Demo: Setting up a VPN | 01:37 |
Video Name | Time | |
---|---|---|
1. Planning for the Worst | 02:09 | |
2. Redundant Power | 03:08 | |
3. Backup Power | 03:06 | |
4. Data Redundancy | 04:39 | |
5. Demo: RAIDs | 03:35 | |
6. Network Redundancy | 02:04 | |
7. Server Redundancy | 01:42 | |
8. Redundant Sites | 02:20 | |
9. Data Backup | 02:54 | |
10. Tape Rotation | 03:52 | |
11. Disaster Recovery Plan | 05:38 |
Video Name | Time | |
---|---|---|
1. Social Engineering | 00:52 | |
2. Demo: Pretexting | 04:14 | |
3. Insider Threat | 02:10 | |
4. Phishing | 01:13 | |
5. More Social Engineering | 04:00 | |
6. User Education | 04:44 |
Video Name | Time | |
---|---|---|
1. Policies and Procedures | 05:53 | |
2. Data Classifications | 06:42 | |
3. PII and PHI | 06:19 | |
4. Security Policies | 10:19 | |
5. User Education | 04:02 | |
6. Vendor Relationships | 07:52 | |
7. Disposal Policies | 05:04 | |
8. Incident Response Procedures | 04:36 | |
9. Data Collection Procedures | 03:11 | |
10. Demo: Disk Imaging | 06:56 | |
11. IT Security Frameworks | 03:18 |
Video Name | Time | |
---|---|---|
1. Exam Tricks | 04:09 |
Student Feedback
Similar Courses
Only Registered Members can View Training Courses
Please fill out your email address below in order to view Training Courses. Registration is Free and Easy, You Simply need to provide an email address.
Try Free Demo
Try Free Demo
Get 10% Discount on Your Purchase When You Sign Up for Email
Enter Your Email Address to Receive Your 10%
OFF Discount Code Plus... Our Exclusive Weekly Deals