In this complete #compTIA #security+ course you will learn everything you need to know about IT / cyber security. Every topic of #IT #Security has been presented in a very comprehensive manner. Take this course to prepare yourself well to sit for the compTIA security+ exam.
**** Topics Discussed ****
Introduction to Network Devices (part 1) (0:00)
Introduction to Network Devices (part 2) (8:06)
Introduction to Network Devices (part 3) (15"50)
Secure Network Administration Concepts (34:00)
Cloud Concepts (41:00)
Secure Network Design Elements and Components (48:00)
Common Network Protocols (part 1) (55:20)
Common Network Protocols (part 2) (1:01:00)
Common Network Protocols (part 3) (1:08:00)
Wireless Security Considerations (1:13:54)
Risk Related Concepts (part 1) (1:23:12)
Risk Related Concepts (part 2) (1:29:43)
Risk Related Concepts (part 3) (1:36:08)
Integrating Data and Systems w Third Parties(21:50)
Risk Mitigation Strategies (1:41:27)
Basic Forensic Procedures (1:46:17)
Incident Response Concepts (1:54:15)
Security Related Awareness and Training (1:59:38)
Physical Security and Enviornmental Controls (2:08:03)
Disaster Recovery Concepts (2:15:46)
Risk Management Best Practices (2:23:30)
Goals of Security Controls (2:30:54)
Types of Malware (2:37:02)
A Summary of Types of Attacks (part 1) (2:43:23)
A Summary of Types of Attacks (part 2) (2:52:43)
A Summary of Social Engineering Attacks (2:59:15)
A Summary of Wireless Attacks (3:07:27)
Types of Application Attacks part 1
Types of Application Attacks part 2 (3:10:51)
Security Enhancement Techniques (3:15:33)
Overview of Security Assessment Tools (3:22:21)
Vulnerability Scanning vs Pen Testing (3:30:28)
Application Security Controls and Techniques (3:37:10)
Mobile Security Concepts and Technologies (part 1) (3:45:00)
Mobile Security Concepts and Technologies (part 2)(3:52:00)
Solutions Used to Establish Host Security (3:56:20)
Controls to Ensure Data Security (4:04:00)
Mitigating Risks In Alternative Environments (4:12:00)
Summary of Authentication Services (4:21:20)
Authentication and Authorization Basics (part 1) (4:28:00)
Authentication and Authorization Basics (part 2) (4:35:00)
Security Controls for Account Management
Introduction to Cryptography (part 1) (4:44:00)
Introduction to Cryptography (part 2) (4:52:00)
Cryptographic Methods (part 1) (5:00:00)
Cryptographic Methods (part 2)(5:05:44)
Introduction to Public Key Infrastructure (part 1) (5:13:00)
Introduction to Public Key Infrastructure (part 2) (5:19:00)
*** Attribution ***
Course Created by: PaceIT Online
YouTube: https://www.youtube.com/channel/UCyTeMuUkzoB2Cl0AbRLtICg
License: Creative Commons Attribution license (reuse allowed)
*** Join our community ****
Join our FB Group: https://www.facebook.com/groups/cslesson
Like our FB Page: https://www.facebook.com/cslesson/
Website: https://cslesson.org
**** Topics Discussed ****
Introduction to Network Devices (part 1) (0:00)
Introduction to Network Devices (part 2) (8:06)
Introduction to Network Devices (part 3) (15"50)
Secure Network Administration Concepts (34:00)
Cloud Concepts (41:00)
Secure Network Design Elements and Components (48:00)
Common Network Protocols (part 1) (55:20)
Common Network Protocols (part 2) (1:01:00)
Common Network Protocols (part 3) (1:08:00)
Wireless Security Considerations (1:13:54)
Risk Related Concepts (part 1) (1:23:12)
Risk Related Concepts (part 2) (1:29:43)
Risk Related Concepts (part 3) (1:36:08)
Integrating Data and Systems w Third Parties(21:50)
Risk Mitigation Strategies (1:41:27)
Basic Forensic Procedures (1:46:17)
Incident Response Concepts (1:54:15)
Security Related Awareness and Training (1:59:38)
Physical Security and Enviornmental Controls (2:08:03)
Disaster Recovery Concepts (2:15:46)
Risk Management Best Practices (2:23:30)
Goals of Security Controls (2:30:54)
Types of Malware (2:37:02)
A Summary of Types of Attacks (part 1) (2:43:23)
A Summary of Types of Attacks (part 2) (2:52:43)
A Summary of Social Engineering Attacks (2:59:15)
A Summary of Wireless Attacks (3:07:27)
Types of Application Attacks part 1
Types of Application Attacks part 2 (3:10:51)
Security Enhancement Techniques (3:15:33)
Overview of Security Assessment Tools (3:22:21)
Vulnerability Scanning vs Pen Testing (3:30:28)
Application Security Controls and Techniques (3:37:10)
Mobile Security Concepts and Technologies (part 1) (3:45:00)
Mobile Security Concepts and Technologies (part 2)(3:52:00)
Solutions Used to Establish Host Security (3:56:20)
Controls to Ensure Data Security (4:04:00)
Mitigating Risks In Alternative Environments (4:12:00)
Summary of Authentication Services (4:21:20)
Authentication and Authorization Basics (part 1) (4:28:00)
Authentication and Authorization Basics (part 2) (4:35:00)
Security Controls for Account Management
Introduction to Cryptography (part 1) (4:44:00)
Introduction to Cryptography (part 2) (4:52:00)
Cryptographic Methods (part 1) (5:00:00)
Cryptographic Methods (part 2)(5:05:44)
Introduction to Public Key Infrastructure (part 1) (5:13:00)
Introduction to Public Key Infrastructure (part 2) (5:19:00)
*** Attribution ***
Course Created by: PaceIT Online
YouTube: https://www.youtube.com/channel/UCyTeMuUkzoB2Cl0AbRLtICg
License: Creative Commons Attribution license (reuse allowed)
*** Join our community ****
Join our FB Group: https://www.facebook.com/groups/cslesson
Like our FB Page: https://www.facebook.com/cslesson/
Website: https://cslesson.org
- Category
- Tech Education Channel
Be the first to comment