CompTIA Security+ Full Course

My CS
My CS
1 میلیون بار بازدید - 5 سال پیش - In this complete
In this complete #compTIA #security+ course you will learn everything you need to know about IT / cyber security. Every topic of #IT #Security has been presented in a very comprehensive manner. Take this course to prepare yourself well to sit for the compTIA security+ exam.

*** Topics Discussed ***
          Introduction to Network Devices (part 1) (0:00)
          Introduction to Network Devices (part 2) (8:06)
          Introduction to Network Devices (part 3) (15"50)
          Secure Network Administration Concepts (34:00)
          Cloud Concepts (41:00)
          Secure Network Design Elements and Components (48:00)
          Common Network Protocols (part 1) (55:20)
          Common Network Protocols (part 2) (1:01:00)
          Common Network Protocols (part 3) (1:08:00)
          Wireless Security Considerations (1:13:54)
          Risk Related Concepts (part 1) (1:23:12)
          Risk Related Concepts (part 2) (1:29:43)
          Risk Related Concepts (part 3) (1:36:08)
          Integrating Data and Systems w Third Parties(21:50)
          Risk Mitigation Strategies (1:41:27)
          Basic Forensic Procedures (1:46:17)
          Incident Response Concepts (1:54:15)
          Security Related Awareness and Training (1:59:38)
          Physical Security and Enviornmental Controls (2:08:03)
          Disaster Recovery Concepts (2:15:46)
          Risk Management Best Practices (2:23:30)
          Goals of Security Controls (2:30:54)
          Types of Malware (2:37:02)
          A Summary of Types of Attacks (part 1) (2:43:23)
          A Summary of Types of Attacks (part 2) (2:52:43)
          A Summary of Social Engineering Attacks (2:59:15)
          A Summary of Wireless Attacks (3:07:27)
          Types of Application Attacks part 1
          Types of Application Attacks part 2 (3:10:51)
          Security Enhancement Techniques (3:15:33)
          Overview of Security Assessment Tools (3:22:21)
          Vulnerability Scanning vs Pen Testing (3:30:28)
          Application Security Controls and Techniques (3:37:10)
          Mobile Security Concepts and Technologies (part 1) (3:45:00)
          Mobile Security Concepts and Technologies (part 2)(3:52:00)
          Solutions Used to Establish Host Security (3:56:20)
          Controls to Ensure Data Security (4:04:00)
          Mitigating Risks In Alternative Environments (4:12:00)
          Summary of Authentication Services (4:21:20)
          Authentication and Authorization Basics (part 1) (4:28:00)
          Authentication and Authorization Basics (part 2) (4:35:00)
          Security Controls for Account Management
          Introduction to Cryptography (part 1)  (4:44:00)
          Introduction to Cryptography (part 2) (4:52:00)
          Cryptographic Methods (part 1) (5:00:00)
          Cryptographic Methods (part 2)(5:05:44)
          Introduction to Public Key Infrastructure (part 1) (5:13:00)
          Introduction to Public Key Infrastructure (part 2) (5:19:00)

** Attribution **
Course Created by: PaceIT Online
YouTube: @paceitonline
License: Creative Commons Attribution license (reuse allowed)

** Join our community ***
Join our FB Group: Facebook: cslesson
Like our FB Page: Facebook: cslesson
Website:
5 سال پیش در تاریخ 1399/01/04 منتشر شده است.
1,041,379 بـار بازدید شده
... بیشتر