INE - CompTIA Security+
English | flv | H264 1280x720 | AAC 2 ch | 15 hrs 32 min | 4.55 GB
The CompTIA Security+ exam encompasses foundational information security principles for network security and enterprise risk management. This course, featuring over 15 hours of instruction, will help you develop the knowledge and skills necessary to identify and mitigate risk, apply security controls to protect confidentiality, integrity, and availability, gain an understanding of typical security technologies, identify and troubleshoot security events and incidents, and understand the roles of policies, laws, and regulations. Covering topics such as cryptography, access control, and identity management, this course also includes the recently added topics of cloud computing, bring-your-own-device, and SCADA system security. By the end of the course, students will have a firm grasp on application, information, infrastructure, and operational security principles.
Table of Contents:
Network Security1. Introduction to Security
2. Network Design and OSI Model
3. Network Devices
4. Server Security
5. Cloud Computing
6. Additional Concepts (LAN/WAN, NAC, DMZ, NAT, Subnetting)
7. Common Ports and Protocols
8. Network Attacks (DoS, DDos, Spoofing, Hijacking, etc.)
9. Common Configuration Vulnerabilities
10. Vulnerabilities in Cabled Devices
11. Securing Wireless Networks
12. Bluetooth Vulnerabilities
Compliance and Operational Security
13. Environmental Controls
14. Social Engineering
15. Organizational Policies and Legal Compliance
16. System Redundancy
17. Disaster Recovery
Threats and Vulnerabilities
18. Threats and Vulnerabilities Introduction
19. Threats to Computer Systems
20. Implementing Security :: Part 1
21. Implementing Security :: Part 2
22. The Basics of Risk Assessments
23. Qualitative and Quantitative Methods
24. Analysis Methodologies
25. Security Controls and Vulnerability Management :: Part 1
26. Security Controls and Vulnerability Management :: Part 2
27. Penetration Testing
28. Vulnerability Scanning & Sniffing Attacks
29. Password Auditing and Analysis
30. System and Network Monitoring
31. Auditing
Application, Data and Host Security
32. Introduction to Research Tools
33. Securing the Web Browser
34. Securing Applications
35. Secure Programming
36. Programming Vulnerabilities and Attacks :: Part 1
37. Programming Vulnerabilities and Attacks :: Part 2
38. Securing the Operating System :: Part 1
39. Securing the Operating System :: Part 2
40. Virtualization Technologies :: Part 1
41. Virtualization Technologies :: Part 2
Access Controls and Identity Management
42. Access Control And Identity Management :: Introduction
43. Authentication Models :: Part 1
44. Access Control Models and Mechanisms :: Part 1
45. Access Control Models and Mechanisms :: Part 2
46. Physical Security
47. Authentication Models :: Part 2
48. Authentication Models :: Part 3
Cryptography
49. Introduction to Cryptography
50. Encryption and Hashing Concepts :: Part 1
51. Encryption and Hashing Concepts :: Part 2
52. Public Key Infrastructure
53. Security+ Review & Resources :: Part 1
54. Security+ Review & Resources :: Part 2