Tags
Language
Tags
November 2024
Su Mo Tu We Th Fr Sa
27 28 29 30 31 1 2
3 4 5 6 7 8 9
10 11 12 13 14 15 16
17 18 19 20 21 22 23
24 25 26 27 28 29 30

Comptia Security+ (Sy0-701) Practical Skills

Posted By: ELK1nG
Comptia Security+ (Sy0-701) Practical Skills

Comptia Security+ (Sy0-701) Practical Skills
Published 5/2024
MP4 | Video: h264, 1920x1080 | Audio: AAC, 44.1 KHz
Language: English | Size: 6.40 GB | Duration: 12h 13m

CompTIA Security+ (SY0-701) practical skills

What you'll learn

Security Concept Fundamentals

Threat Vectors and Attack Surfaces, Analyze Malicious Activity, Mitigation Techniques

Identifying Security Vulnerabilities, Security Architecture Models

Securing Enterprise Infrastructures, Data Protection Strategies

Resilience in Security Architecture, Securing Computing Resources

Asset Management Techniques, Vulnerability Management

Monitoring Computing Resources, Investigative Data Sources

Implementation of Automation & Orchestration for Security Operations

Requirements

Basic Networking Foundation Knowledge, Basic Foundation of Linux Systems

Description

Welcome to the Security+ (SY0-701) Practical Skills course. Upon completion of this course, you will have acquired hands-on experience in analyzing a network infrastructure for potential security vulnerabilities and implementing remediation strategies for these vulnerabilities.Through the completion of the modules, you will enhance your practical skills in identifying and fortifying a network infrastructure against cyber security threats. These modules are designed to align with the practical objectives and competencies outlined in the CompTIA Security+ certification exam (SY0-701).The CompTIA Security+ (SY0-701) exam serves as an entry-level cyber security certification, targeting IT security analysts, vulnerability analysts, threat intelligence analysts, or IT professionals aspiring to enter the industry.The content of this course emphasizes the practical aspects of the exam objectives. No prior hands-on experience is necessary to utilize or complete this Practice Lab. However, a foundational understanding of IT networking and basic Linux concepts is preferred to facilitate comprehension of the course content and labs.Throughout this course, we will utilize JSS labs. However, students are welcome to utilize home-based labs such as VirtualBox or other virtualization technologies. We will provide a video tutorial demonstrating a similar setup to our JSS labs, enabling you to replicate it should you choose to utilize home-based labs.

Overview

Section 1: Introduction

Lecture 1 Introduction

Lecture 2 Free 10 Days Practice Exam Information

Lecture 3 Quick Prerequisite or Expectation Check

Lecture 4 Build a Sec+ Home Lab

Section 2: Security Concept Fundamentals

Lecture 5 Trainer Knowledge Share Video

Lecture 6 Introduction - Security Concept Fundamentals

Lecture 7 Exercise 1 - Configure RAID 1

Lecture 8 Exercise 2 - Configure and Test File Integrity Monitoring

Lecture 9 Interview Questions & Answers

Section 3: Cryptographic Solutions

Lecture 10 Introduction - Cryptographic Solutions

Lecture 11 Exercise 1 - Create and Verify a Digital Signature

Lecture 12 Exercise 2 - Create and Approve a Certificate Signing Request

Lecture 13 Interview Questions and Answers

Section 4: Threat Vectors and Attack Surfaces

Lecture 14 Trainer Knowledge Share Video

Lecture 15 Introduction - Threat Vectors and Attack Surfaces

Lecture 16 Exercise 1 - Open Service Ports

Lecture 17 Exercise 2 - Default Credentials

Lecture 18 Exercise 3 - Vulnerable Applications

Lecture 19 Interview Questions and Answers

Section 5: Identifying Security Vulnerabilities

Lecture 20 Trainer Knowledge Share Video

Lecture 21 Introduction - Identifying Security Vulnerabilities

Lecture 22 Exercise 1 - Identify LM Hash Vulnerabilities

Lecture 23 Exercise 2 - Identify DNS Transfer Vulnerabilities

Lecture 24 Interview Questions and Answers

Section 6: Analyze Malicious Activity

Lecture 25 Trainer Knowledge Share Video

Lecture 26 Introduction - Analyze Malicious Activity

Lecture 27 Exercise 1 - Observe Indications of a Brute Force Attack

Lecture 28 Exercise 3 - Observe Indications of a SYN Flood Attack

Lecture 29 Interview Questions and Answers

Section 7: Mitigation Techniques

Lecture 30 Trainer Knowledge Share Video

Lecture 31 Introduction - Mitigation Techniques

Lecture 32 Exercise 1 - Configure Router Access

Lecture 33 Exercise 2 - Harden Router Access

Lecture 34 Exercise 3 - Configure Router Logging

Section 8: Security Architecture Models

Lecture 35 Trainer Knowledge Share Video

Lecture 36 Introduction Security Architecture Models

Lecture 37 Exercise 1 - Create a VM

Lecture 38 Exercise 2 - Use Containers

Lecture 39 Exercise 3 - Complete VM Deployment

Section 9: Securing Enterprise Infrastructures

Lecture 40 Trainer Knowledge Share Video

Lecture 41 Introduction Securing Enterprise Infrastructures

Lecture 42 Exercise 1 - Install and Configure a VPN Server

Lecture 43 Exercise 2 - Create a VPN User and Client

Lecture 44 Exercise 3 - Configure a L2TP/IPsec VPN

Lecture 45 Interview Questions and Answers

Section 10: Data Protection Strategies

Lecture 46 Trainer Knowledge Share Video

Lecture 47 Introduction Data Protection Strategies

Lecture 48 Exercise 1 - Encryption

Lecture 49 Exercise 2 - Hashing

Lecture 50 Exercise 3 - Obfuscation

Lecture 51 Interview Questions and Answers

Section 11: Resilience in Security Architecture

Lecture 52 Trainer Knowledge Share Video

Lecture 53 Introduction Resilience in Security Architecture

Lecture 54 Exercise 1 - Prepare WIN11 and Install EaseUS Todo Backup

Lecture 55 Exercise 2 - Conduct and Restore from Incremental Backups

Lecture 56 Exercise 3 - Conduct Differential Backups and Examine all Backup Files

Lecture 57 Exercise 4 - Investigate the Archive Bit

Section 12: Securing Computing Resources

Lecture 58 Trainer Knowledge Share Video

Lecture 59 Introduction Securing Computing Resources

Lecture 60 Exercise 1 - Establish a Baseline

Lecture 61 Exercise 2 - Input Validation

Lecture 62 Exercise 3 - Sandboxing

Section 13: Asset Management Techniques

Lecture 63 Trainer Knowledge Share Video

Lecture 64 Introduction - Asset Management Techniques

Lecture 65 Exercise 1 - Deploy an Asset and License

Lecture 66 Exercise 2 - Secure Data Sanitization

Section 14: Vulnerability Management

Lecture 67 Introduction - Vulnerability Management

Lecture 68 Trainer Knowledge Share Video

Lecture 69 Exercise 1 - Detect Web Application Vulnerabilities

Lecture 70 Exercise 2 - Monitor Devices for Vulnerabilities

Lecture 71 Interview Questions and Answers

Lecture 72 Information Tips

Lecture 73 Security Assessments and Tools Lecture

Lecture 74 Conduct a Software Vulnerability Scan Using AlienVault

Lecture 75 Conduct a Software Vulnerability Scan using Nessus

Lecture 76 Review a Template Incident Response Documentation

Section 15: Monitoring Computing Resources

Lecture 77 Introduction - Monitoring Computing Resources

Lecture 78 Exercise 1 - Monitoring Device Resource Utilization

Lecture 79 Interview Questions and Answers

Section 16: Enhancing Enterprise Security

Lecture 80 Trainer Knowledge Share Video

Lecture 81 Introduction Enhancing Enterprise Security

Lecture 82 Exercise 1 - Linux Server Hardening Techniques

Lecture 83 Exercise 2 - Windows Server Hardening Techniques

Section 17: Implement Identity & Access Management

Lecture 84 Trainer Knowledge Share Video

Lecture 85 Introduction Implement Identity & Access Management

Lecture 86 Exercise 1 - Provisioning User Accounts on a Microsoft Server

Lecture 87 Exercise 2 - Provisioning User Accounts on a Linux Server

Section 18: Implementation of Automation & Orchestration for Security Operations

Lecture 88 Trainer Knowledge Share Video

Lecture 89 Introduction Implementation of Automation & Orchestration for Security Operation

Lecture 90 Exercise 1 - Creating Automation Scripts

Section 19: Investigative Data Sources

Lecture 91 Trainer Knowledge Share Video

Lecture 92 Introduction Investigative Data Sources

Lecture 93 Exercise 1 - Log File Analysis

Section 20: Cloud and Security

Lecture 94 Information Tips

Lecture 95 Introductory Lecture: Securing Cloud Infrastructure Resources

Lecture 96 Encrypt an Azure VM OS and Data Disks

Lecture 97 Investigating AWS Artifact

Lecture 98 Security Groups in AWS

Lecture 99 Next Course to take

Lecture 100 Bonus Lecture

This course is designed for IT professionals looking to transition into cybersecurity in order to learn the technical skills and gain confidence,New Cybersecurity Analyst