Getting Started With CompTIA Security+ Training
- 11m 1s
—Introduction
1m 12s
—What Will We Be Doing?
2m 8s
—Who is Your Instructor?
1m 27s
— What Areas of Security Are Covered?
3m 7s
—How to Use This Course
3m 7s
The Course Scenario
- 5m 52s
—Meet Globomantics Inc.
1m 26s
—Globomantics Security Challenges
4m 26s
Security Overview
- 55m 20s
—Introduction
1m 34s
—What is Security?
4m 54s
—Risk Management
5m 47s
—How Did We Get Here?
6m 55s
—Organizational Security
2m 16s
—Network Security
3m 10s
—System Security
6m 38s
—Access Control
4m 56s
—Cryptography
3m 21s
—Assessment and Audits
1m 44s
—CIA - Confidentiality, Integrity, and Availability
3m 31s
—AAA - Access, Authentication, and Auditing
2m 30s
—Security In Layers
2m 46s
—What We Covered
1m 43s
—Vocabulary You Should Know
3m 35s
Redundancy and Fault Tolerance
- 40m 4s
—Introduction
1m 59s
—Single Points of Failure
1m 26s
—Fault Tolerance
2m 31s
—Redundant Array of Inexpensive Disk (RAID)
5m 30s
—Heating Ventilation and Air Conditioning (HVAC)
4m 6s
—Fire Suppression
4m 54s
—Redundancy
2m 45s
—Storage Redundancy
1m 10s
—Network Redundancy
1m 4s
—Redundant Sites
4m 9s
—Environmental Components
1m 7s
—What We Covered
3m 27s
—Vocabulary You Should Know
5m 56s
Implementing Disaster Recovery
- 34m 44s
—Introduction
2m 32s
—Disaster Recovery Planning
9m 9s
—System and Data Backup and Restore - Types of Backup Jobs
7m 55s
—System and Data Backup and Restore - Rotation Schemes
5m 34s
—Disaster Recovery Exercise
4m 31s
—What We Covered
5m 3s
Incident Response
- 30m 48s
—Introduction
1m 49s
—Forensics
3m 27s
—Incident Response
9m 34s
—Chain of Custody
2m 8s
—Collection of Evidence
8m 33s
—What We Covered
2m 10s
—Vocabulary You Should Know
3m 7s
Social Engineering
- 39m 15s
—Introduction
2m 2s
—Social Engineering
2m 25s
—Social Engineering Tactics
5m 47s
—Phishing
11m 56s
—Hoaxes
3m 1s
—Dumpster Diving
2m 1s
—Tail Gating
0m 51s
—Shoulder Surfing
1m 17s
—User Education and Awareness
2m 45s
—What We Covered
3m 0s
—Vocabulary You Should Know
4m 10s
Organizational Policies
- 36m 43s
—Introduction
1m 39s
—Policies Overview
3m 44s
—Due Care, Due Diligence, and Due Process
2m 59s
—Security Controls
3m 5s
—IT Security Policy Components
6m 23s
—Regulatory Compliance
1m 23s
—Risk Management
3m 20s
—Separation of Duties
1m 20s
—Change Management
1m 20s
—Security Related HR Policies
4m 16s
—Management Involvement in IT Security
0m 57s
—What We Covered
3m 13s
—Vocabulary You Should Know
3m 4s
System Scanning and Monitoring
- 58m 3s
—Introduction
3m 11s
—System Monitors
11m 23s
—Performance Monitoring
3m 18s
—Network Tools
1m 5s
—Port Scanner
4m 2s
—Protocol Analyzer
3m 49s
—Network Mapper
2m 38s
—Vulnerability Scanner
3m 8s
—Intrusion Detection Systems
1m 50s
—Network-based vs. Host-based IDS
2m 34s
—Signature-based IDS vs. Anomaly-based IDS
3m 55s
—Passive vs. Reactive IDS
3m 5s
—Penetration Testing
5m 25s
—What We Covered
4m 47s
—Vocabulary You Should Know
3m 53s
Logging and Auditing
- 47m 30s
—Introduction
3m 48s
—Logging
6m 9s
—Centralized vs. Distributed Logging
5m 29s
—Log Rotation and Retention
3m 41s
—System Logs
2m 32s
—Application Logs
3m 1s
—Security Logs
2m 47s
—Auditing
1m 34s
—User Access and Rights Review
1m 39s
—Risk Assessment and Mitigation
1m 7s
—Logging Demo
12m 27s
—What We Covered
3m 16s
Network Design Components
- 34m 53s
—Introduction
2m 40s
—N-Tier Archatecture
4m 45s
—Network Access Control (NAC)
3m 42s
—Network Access Translation (NAT)
2m 21s
—Security Zones and Demilitarized Zones (DMZ)
4m 44s
—Intranet
0m 35s
—Extranet
2m 14s
—VLAN
6m 10s
—What We Covered
5m 16s
—Vocabulary You Should Know
2m 26s
Networking Components
- 1h 6m
—Introduction
2m 18s
—Coaxial Cable
10m 41s
—Twisted Pair Cable
6m 3s
—Fiber Optic Cable
5m 32s
—Network Devices
1m 13s
—Hubs
2m 48s
—Switches
5m 48s
—Routers
6m 24s
—Modems and Remote Access Servers (RAS)
2m 27s
—Telephony
3m 21s
—Packet Filtering Firewalls
4m 34s
—Application Layer Firewalls
3m 19s
—Stateful Inspection Firewalls
2m 18s
—What We Covered
5m 28s
—Vocabulary You Should Know
4m 1s
Networking Protocols and Exploitations
- 1h 1m
—Introduction
2m 0s
—OSI 7 Layer Model
4m 40s
—Networking Protocols
6m 19s
—TCP/IP
11m 36s
—Globomantics Scenario
2m 1s
—Spoofing
4m 18s
—Man In The Middle (MITM)
2m 48s
—TCP/IP Hijacking
1m 52s
—Null Session
4m 3s
—Replay Attacks
1m 48s
—Denial of Service (DoS)
2m 38s
—Distributed Denial of Service (DDoS)
1m 53s
—DNS Poisoning
3m 31s
—Scenario Wrap-Up
1m 48s
—What We Covered
4m 16s
—Vocabulary You Should Know
6m 9s
Remote Access Security
- 54m 23s
—Introduction
4m 29s
—Virtual Private Network (VPN)
5m 33s
—Globomantics Scenario
2m 17s
—VPN Tunneling Protocols
1m 13s
—Point to Point Tunneling Protocol (PPTP)
7m 8s
—Layer 2 Tunneling Protocol (L2TP)
6m 41s
—Internet Protocol Security (IPSec)
8m 27s
—Tunneling Protocol Comparison
0m 56s
—Secure Shell (SSH)
2m 13s
—802.1X
4m 3s
—What We Covered
3m 59s
—Vocabulary You Should Know
7m 24s
Wireless Networks
- 59m 55s
—Introduction
1m 40s
—Wireless Communications Overview
7m 25s
—Wireless Access Points
3m 24s
—Wireless Transport Layer Security
3m 16s
—IEEE Wireless Standards
7m 21s
—Protecting Wireless Networks
7m 56s
—Passive and Active Attacks
2m 28s
—Man In The Middle Attacks
3m 59s
—Wardriving
3m 30s
—Bluetooth Vulnerabilities and Protection
3m 30s
—Site Survey
1m 44s
—What We Covered
8m 28s
—Vocabulary You Should Know
5m 14s
—Introduction
3m 47s
—Securing BIOS
8m 26s
—Securing USB Devices
4m 24s
—Securing Directly Attached Storage
2m 48s
—Security Templates
3m 25s
—Configuration Baseline
7m 33s
—Hotfixes, Patches, and Service Packs
3m 26s
—Patch Management
12m 11s
—System Hardening
7m 20s
—What We Covered
6m 33s
—Vocabulary You Should Know
3m 48s
System Security Threats
- 1h 4m
—Introduction
2m 3s
—Default Accounts and Passwords
7m 55s
—Password Strength
7m 44s
—Back Doors
4m 23s
—Privilege Escalation
4m 6s
—Malware
2m 23s
—Root Kits
1m 41s
—Trojan Horses
2m 55s
—Viruses
7m 15s
—Worms
5m 10s
—Spyware
2m 30s
—Spam
6m 10s
—Logic Bombs
2m 15s
—What We Covered
3m 43s
—Vocabulary You Should Know
4m 28s
Security Applications
- 39m 21s
—Introduction
3m 10s
—Personal Software Firewalls
7m 48s
—Host-Based Intrusion Detection Systems
4m 51s
—Proxy Servers
8m 29s
—Honey Pots
3m 49s
—Virtualization Security Considerations
4m 36s
—What We Covered
3m 43s
—Vocabulary You Should Know
2m 55s
E-Mail Security
- 51m 20s
—Introduction
1m 17s
—Background Vocabulary
5m 21s
—Globomantics Scenario
1m 7s
—E-Mail Overview
5m 41s
—E-Mail Protocols
7m 26s
—Multipurpose Internet Mail Extensions (MIME)
4m 18s
—Secure Multipurpose Internet Mail Extensions (S/MIME)
4m 45s
—Pretty Good Privacy (PGP)
4m 58s
—E-Mail Vulnerabilities: SMTP Open Relays and Human Behavior
8m 50s
—What We Covered
5m 39s
—Vocabulary You Should Know
1m 58s
—Introduction
1m 42s
—Web Server Security
10m 14s
—Building Secure Web Services
9m 23s
—Web Services Description Language (WSDL)
4m 55s
—Content Filters
2m 48s
—Browser Protocols
4m 42s
—Instant Messaging
8m 39s
—What We Covered
5m 36s
—Vocabulary You Should Know
1m 25s
Web Based Vulnerabilities
- 53m 8s
—Introduction
1m 40s
—Globomantics Scenario
2m 25s
—Browser Vulnerabilities and Hardening
9m 35s
—Java
8m 32s
—Code Signing
3m 31s
—ActiveX
4m 18s
—Common Gateway Interface (CGI)
6m 30s
—Buffer Overflow
2m 40s
—Cross Site Scripting (XSS)
1m 22s
—Cookies
3m 0s
—What We Covered
7m 19s
—Vocabulary You Should Know
2m 16s
—Introduction
1m 57s
—File Transfer Protocol (FTP) Overview
2m 23s
—FTP Access
1m 48s
—FTP Authentication
1m 52s
—FTP Vulnerabilities
2m 18s
—Securing File Transfer
3m 10s
—What We Covered
2m 21s
—Vocabulary You Should Know
1m 3s
Access Control Models
- 39m 19s
—Introduction
1m 16s
—Access Control Overview
10m 11s
—Classification of Information
8m 8s
—Mandatory Access Control (MAC)
3m 29s
—Discretionary Access Control (DAC)
2m 23s
—Role Base Access Control (RBAC)
6m 31s
—Access Control Models
3m 42s
—Vocabulary You Should Know
3m 39s
Logical and Physical Access Controls
- 59m 49s
—Introduction
2m 19s
—User Names and Passwords
14m 1s
—Logon Time Restrictions
5m 46s
—Account Expiration
2m 56s
—Group Policy
5m 40s
—Tokens
3m 18s
—Identification
1m 46s
—Physical Access Logs and Lists
4m 7s
—Man-Trap
4m 18s
—Door Access Systems
3m 9s
—Video Surveillance
3m 14s
—What We Covered
6m 34s
—Vocabulary You Should Know
2m 41s
Authentication Models
- 55m 0s
—Introduction
1m 18s
—Identification vs. Authentication
2m 43s
—Multi-Tiered Authentication
2m 15s
—Single Sign-on
5m 37s
—Kerberos
10m 38s
—Mutual Authentication
2m 3s
—Lightweight Directory Access Protocol (LDAP)
9m 54s
—Terminal Access Control Access Control System (TACACS)
4m 50s
—Remote Access Dial In User Service (RADIUS)
4m 32s
—Password Authentication Protocol (PAP)
1m 33s
—Challenge Handshake Authentication Protocols (CHAP)
3m 15s
—What We Covered
4m 27s
—Vocabulary You Should Know
1m 55s
Cryptographic Algorithms
- 1h 7m
—Introduction
1m 49s
—Cryptography
4m 9s
—Ciphers
1m 58s
—Substitution Ciphers
6m 3s
—Transposition Cipher
6m 34s
—Block Ciphers
1m 31s
—Stream Ciphers
3m 6s
—Symmetric Keys
6m 3s
—Symmetric Key Algorithms
5m 33s
—Asymmetric Keys
5m 30s
—Asymmetric Algorithms
10m 56s
—Hashing
3m 2s
—Hashing Algorithms
5m 46s
—What We Covered
3m 49s
—Vocabulary You Should Know
2m 5s
Using Cryptography
- 36m 14s
—Introduction
1m 18s
—Cryptographic Key Pair Usage
0m 57s
—X.509
0m 46s
—Digital Certificates
3m 55s
—Single vs. Dual Sided Certificates
2m 57s
—Digital Signatures
3m 24s
—Data Encryption
6m 11s
—Steganography
9m 24s
—What We Covered
4m 22s
—Vocabulary You Should Know
3m 0s
Public Key Infrastructure (PKI)
- 36m 46s
—Introduction
1m 54s
—Public Key Infrastructure (PKI)
2m 8s
—Trust Models
8m 40s
—Hierarchical Trust Model
8m 16s
—Certificate Revocation
3m 31s
—Key Management
4m 1s
—What We Covered
4m 20s
—Vocabulary You Should Know
3m 56s
Preparing for Your CompTIA Security+ SY0-201 Certification Exam
- 11m 14s
—Introduction
1m 4s
—Exam Overview
0m 59s
—Exam Objectives
2m 35s
—Study Recommendations
2m 16s
—Exam Preparation
3m 16s
—What We Covered
1m 4s
—What We Learned in the Course
5m 17s
—Follow Up
1m 30s
—We Value Your Opinion
1m 25s