CompTIA Security+ Video Course

SY0-701: CompTIA Security+

Your CompTIA SY0-701 exam is just around the corner, right? So, it's high time to find an effective preparation tool! Our training course is what you really need! This is a series of videos led by the experienced IT instructors who will provide you with a detailed overview of the SY0-701 certification test. Ace your CompTIA SY0-701 at the first attempt and obtain the CompTIA Security+ credential with ease.

# of Students
93
# of Lectures
167
Course Length
19 h
Course Rating
5.0

Curriculum for SY0-701 Video Course

Chapter 0 - About Security+

  Video Name Time
1. Introduction to the CompTIA Security+ (SY0-701) Exam Prep Course 2:42
2. About the CompTIA Security+ (SY0-701) Exam 7:54
3. How to Take Your CompTIA Security+ (SY0-701) Exam 8:38
  Video Name Time
1. Defining Business Risk 5:06
2. Threat Actors, Part 1 4:31
3. Threat Actors, Part 2 2:22
4. Threat Intelligence 9:33
5. Risk Management Concepts 7:12
6. Security Controls 9:07
7. Risk Assessments and Treatments 5:32
8. Quantitative Risk Assessments 6:25
9. Qualitative Risk Assessments 3:43
10. Security and the Information Life Cycle 8:52
11. Data Destruction 5:52
12. Chapter 1 Exam Question Review 1:40
13. Wiping Disks with the dd Command Lab 5:39
  Video Name Time
1. Cryptography Basics 15:39
2. Hashing 8:25
3. Cryptographic Attacks 5:06
4. Password Cracking 9:56
5. Password Cracking Demo 6:09
6. Chapter 2 Exam Question Review 2:27
7. SSH Public Key Authentication Lab 9:04
  Video Name Time
1. Physical Security 9:42
2. Keylogger Demo 4:45
3. Environmental Controls 5:16
4. Chapter 3 Exam Question Review 2:25
5. Physical Security Lab 2:54
  Video Name Time
1. Identification, Authentication, and Authorization 7:48
2. Enabling Multifactor Authentication 4:36
3. Authorization 4:42
4. Accounting 5:15
5. Authentication Methods 13:54
6. Access Control Schemes 6:39
7. Account Management 12:57
8. Network Authentication 8:50
9. Identity Management Systems 5:45
10. Chapter 4 Exam Question Review 2:16
11. Creating Linux Users and Groups Lab 5:45
  Video Name Time
1. Touring the CLI 15:02
2. Shells 5:54
3. The Windows Command Line 4:24
4. Microsoft PowerShell 12:16
5. Linux Shells 10:51
6. Network Scanners 5:01
7. Network Scanning with Nmap 8:51
8. Network Protocol Analyzers 7:42
9. Using Wireshark to Analyze Network Traffic 8:12
10. Using tcpdump to Analyze Network Traffic 8:09
11. Log Files 8:27
12. Centralized Logging 8:41
13. Cybersecurity Benchmark Tools 4:43
14. Configuring Linux Log Forwarding 8:14
15. Chapter 5 Exam Question Review 2:57
16. Linux Shell Script Lab 7:10
17. Nmap Lab 4:32
  Video Name Time
1. Malware 13:12
2. Weak Configurations 11:22
3. Common Attacks 8:54
4. Overflow Attacks 5:28
5. Password Attacks 7:52
6. Bots and Botnets 6:03
7. Disk RAID Levels 10:01
8. Securing Hardware 10:50
9. Securing Endpoints 8:46
10. Securing Data with Encryption 6:22
11. Chapter 6 Exam Question Review 2:20
12. Linux Software RAID Lab 7:32
13. Secure Enclave Lab in macOS 3:30
  Video Name Time
1. Data Protection 9:23
2. Cryptographic Methods 7:04
3. Symmetric Cryptosystems 12:29
4. Symmetric Block Modes 7:56
5. Asymmetric Cryptosystems 12:35
6. Understanding Digital Certificates 7:09
7. Trust Models 4:36
8. Public Key Infrastructure 3:22
9. Certificate Types 12:03
10. Touring Certificates 7:52
11. Network Architecture Planning 3:32
12. The OSI Model 12:31
13. ARP Cache Poisoning 8:31
14. Other Layer 2 Attacks 5:07
15. Network Planning 6:54
16. Zero Trust Network Access (ZTNA) 2.0 9:32
17. Load Balancing 6:02
18. Securing Network Access 6:08
19. Honeypots 5:52
20. Static and Dynamic Code Analysis 4:35
21. Firewalls 11:09
22. Proxy Servers 6:04
23. Web Filtering 5:07
24. Network and Port Address Translation 6:38
25. IP Security (IPsec) 8:41
26. SD-WAN and SASE 2:59
27. Virtual Private Networks (VPNs) 9:49
28. Intrusion Detection and Prevention Systems (IDS/IPS) 12:50
29. Chapter 7 Exam Question Review 3:25
30. Linux Snort IDS Lab 7:21
  Video Name Time
1. Wi-Fi Encryption Standards 9:25
2. RFID, NFC, and Bluetooth 6:34
3. Wi-Fi Coverage and Performance 8:06
4. Wi-Fi Discovery and Attacks 11:57
5. Cracking WPA2 10:13
6. Wi-Fi Hardening 10:15
7. Chapter 8 Exam Question Review 01:42
8. WPA2 Cracking Lab 6:29
  Video Name Time
1. Defending a Public Server 0:45
2. Common Attacks and Mitigations 9:36
3. DDoS Attacks in the Real World 2:34
4. Containers and Software-Defined Networking 11:17
5. Hypervisors and Virtual Machines 8:13
6. Cloud Deployment Models 8:35
7. Cloud Service Models 8:16
8. Securing the Cloud 10:06
9. Chapter 9 Exam Question Review 02:11
10. Docker Container Lab 4:08
  Video Name Time
1. Industrial Control System (ICS) 6:32
2. Internet of Things (IoT) Devices 9:54
3. Connecting to Dedicated and Mobile Systems 10:39
4. Security Constraints for Dedicated Systems 4:58
5. Mobile Device Deployment and Hardening 10:53
6. Chapter 10 Exam Question Review 2:33
7. Smartphone Hardening Lab 2:32
8. Embedded Systems 12:53
  Video Name Time
1. FTP Packet Capture 0:48
2. Secure Web and E-mail 3:19
3. Request Forgery Attacks 11:31
4. Cross-Site Scripting Attacks 4:41
5. DNS Security 6:58
6. Web Application Security 5:09
7. OWASP Top 10 11:39
8. Web App Vulnerability Scanning 5:44
9. Chapter 11 Exam Question Review 3:09
10. OWASP ZAP Web App Scan Lab 4:23
  Video Name Time
1. Testing Infrastructure Overview 4:31
2. Social Engineering Attacks 5:24
3. Vulnerability Assessments 8:43
4. Penetration Testing 9:29
5. The Metasploit Framework 7:52
6. Chapter 12 Exam Question Review 1:46
  Video Name Time
1. Introduction to Business Security 5:54
2. Business Impact Analysis 9:05
3. Data Types and Roles 11:16
4. Personnel Risk and Policies 10:11
5. Attestation 3:13
6. Internal Audits and Assessments 5:19
7. External Audits and Assessments 6:13
8. Third-Party Risk Management 8:16
9. Agreement Types 6:15
10. Change Management 4:01
11. Technical Change Management 6:57
12. What Is Automation and Orchestration? 3:34
13. Benefits of Automation and Orchestration 2:47
14. Use Cases of Automation and Orchestration 7:25
15. Other Considerations of Automation and Orchestration 5:22
16. Putting It All Together 6:00
17. Exploring the NIST Frameworks 7:30
  Video Name Time
1. Incident Response Overview 2:22
2. Incident Response Plans (IRPs) 5:46
3. IRP Testing 5:40
4. Threat Analysis and Mitigating Actions 7:27
5. Digital Forensics 4:59
6. Business Continuity and Alternate Sites 6:02
7. Data Backup 9:31
8. Chapter 14 Exam Question Review 1:00
9. Autopsy Forensic Browser Lab 4:58

Student Feedback

5 Stars
4 Stars
3 Stars
2 Stars
1 Star
5.0
Rating: 5.0
Overall Rating: Good.

Similar Courses

Only Registered Members can View Training Courses

Please fill out your email address below in order to view Training Courses. Registration is Free and Easy, You Simply need to provide an email address.

  • Trusted by 1.2M IT Certification Candidates Every Month
  • Hundreds Hours of Videos
  • Instant download After Registration

Already Member? Click here to Login

A confirmation link will be sent to this email address to verify your login

1200+ IT Certification Exams available: Get a free sample of any exam right now!
Try Free Demo

Try Free Demo

  • ABA
  • ACAMS
  • ACFE
  • ACI
  • ACSM
  • Adobe
  • AHIP
  • AHLEI
  • AICPA
  • AIWMI
  • Alfresco
  • Alibaba
  • AMA
  • AndroidATC
  • APBM
  • API
  • APICS
  • Apple
  • Arista
  • ASIS
  • ASQ
  • Atlassian
  • Autodesk
  • Avaya
  • Axis Communications
  • BACB
  • BCS
  • Blockchain
  • Blue Coat
  • Blue Prism
  • C++ Institute
  • CA Technologies
  • CertNexus
  • Checkpoint
  • CIMA
  • Cisco
  • Citrix
  • CIW
  • Cloudera
  • CNCF
  • CompTIA
  • CSA
  • CyberArk
  • Dell
  • DMI
  • DSCI
  • EMC
  • Esri
  • Exin
  • Extreme Networks
  • F5
  • FileMaker
  • FINRA
  • Fortinet
  • GAQM
  • GARP
  • Genesys
  • GIAC
  • Google
  • Guidance Software
  • H3C
  • HashiCorp
  • HFMA
  • HIPAA
  • Hitachi
  • HP
  • HRCI
  • Huawei
  • IAPP
  • IBM
  • IFPUG
  • IIA
  • IIBA
  • Informatica
  • iSAQB
  • ISC
  • iSQI
  • ISTQB
  • ITIL
  • Juniper
  • Lenovo
  • Linux Foundation
  • Logical Operations
  • LPI
  • Magento
  • Marketo
  • McAfee
  • Microsoft
  • Mirantis
  • Mulesoft
  • NACVA
  • NCMA
  • NetSuite
  • Network Appliance
  • NI
  • Nokia
  • Novell
  • Nuage Networks
  • Nutanix
  • OMG
  • Palo Alto Networks
  • Pegasystems
  • PEOPLECERT
  • PMI
  • PRINCE2
  • Pulse Secure
  • Python Institute
  • QlikView
  • RedHat
  • Riverbed
  • RSA
  • Salesforce
  • SANS
  • SAP
  • SAS Institute
  • Scrum
  • SDI
  • ServiceNow
  • Six Sigma
  • Slack
  • SNIA
  • Snowflake
  • SOA
  • Software Certifications
  • SolarWinds
  • Splunk
  • SpringSource
  • Symantec
  • Teradata
  • Test Prep
  • The Open Group
  • Tibco
  • UiPath
  • Unity Certification
  • VCE
  • Veeam
  • Veritas
  • Vmedu
  • VMware
  • WatchGuard
  • WorldatWork
  • Zend
Next Step
Next Step

Try Free Demo

  • CompTIA
Next Step
Next Step

Get 10% Discount on Your Purchase When You Sign Up for Email

Passguide Products

Enter Your Email Address to Receive Your 10%
OFF
Discount Code Plus... Our Exclusive Weekly Deals

* We value your privacy. We will not rent or sell your email address