CompTIA Security+ Training Course
Offered By: Professor Messer via YouTube
Course Description
Overview
Syllabus
How to Pass your SY0-601 Security+ Exam.
Phishing - SY0-601 CompTIA Security+ : 1.1.
Impersonation - CompTIA SY0-601 Security+ : 1.1.
Dumpster Diving - SY0-601 CompTIA Security+ : 1.1.
Shoulder Surfing - SY0-601 CompTIA Security+ : 1.1.
Hoaxes - SY0-601 CompTIA Security+ : 1.1.
Watering Hole Attacks - SY0-601 CompTIA Security+ : 1.1.
Spam - SY0-601 CompTIA Security+ : 1.1.
Influence Campaigns - SY0-601 CompTIA Security+ : 1.1.
Other Social Engineering Attacks - SY0-601 CompTIA Security+ : 1.1.
Principles of Social Engineering - SY0-601 CompTIA Security+ : 1.1.
An Overview of Malware - SY0-601 CompTIA Security+ : 1.2.
Viruses and Worms - SY0-601 CompTIA Security+ : 1.2.
Ransomware and Crypto-malware - SY0-601 CompTIA Security+ : 1.2.
Trojan and RATs - SY0-601 CompTIA Security+ : 1.2.
Rootkits - SY0-601 CompTIA Security+ : 1.2.
Spyware - SY0-601 CompTIA Security+ : 1.2.
Bots and Botnets - SY0-601 CompTIA Security+ : 1.2.
Logic Bombs - SY0-601 CompTIA Security+ : 1.2.
Password Attacks - SY0-601 CompTIA Security+ : 1.2.
Physical Attacks - SY0-601 CompTIA Security+ : 1.2.
Adversarial Artificial Intelligence - SY0-601 CompTIA Security+ : 1.2.
Supply Chain Attacks - SY0-601 CompTIA Security+ : 1.2.
Cloud-based vs. On-Premises Attacks - SY0-601 CompTIA Security+ : 1.2.
Cryptographic Attacks - SY0-601 CompTIA Security+ : 1.2.
Privilege Escalation - SY0-601 CompTIA Security+ : 1.3.
Cross-site Scripting - SY0-601 CompTIA Security+ : 1.3.
Injection Attacks - SY0-601 CompTIA Security+ : 1.3.
Buffer Overflows - SY0-601 CompTIA Security+ : 1.3.
Replay Attacks - SY0-601 CompTIA Security+ : 1.3.
Request Forgeries - SY0-601 CompTIA Security+ : 1.3.
Driver Manipulation - SY0-601 CompTIA Security+ : 1.3.
SSL Stripping - SY0-601 CompTIA Security+ : 1.3.
Race Conditions - SY0-601 CompTIA Security+ : 1.3.
Other Application Attacks - SY0-601 CompTIA Security+ : 1.3.
Rogue Access Points and Evil Twins - SY0-601 CompTIA Security+ : 1.4.
Bluejacking and Bluesnarfing - SY0-601 CompTIA Security+ : 1.4.
Wireless Disassociation Attacks - SY0-601 CompTIA Security+ : 1.4.
Wireless Jamming - SY0-601 CompTIA Security+ : 1.4.
RFID and NFC Attacks - SY0-601 CompTIA Security+ : 1.4.
Randomizing Cryptography - SY0-601 CompTIA Security+ : 1.4.
On-Path Attacks - SY0-601 CompTIA Security+ : 1.4.
MAC Flooding and Cloning - SY0-601 CompTIA Security+ : 1.4.
DNS Attacks - SY0-601 CompTIA Security+ : 1.4.
Denial of Service - SY0-601 CompTIA Security+ : 1.4.
Malicious Scripts - SY0-601 CompTIA Security+ : 1.4.
Threat Actors - SY0-601 CompTIA Security+ : 1.5.
Attack Vectors - SY0-601 CompTIA Security+ : 1.5.
Threat Intelligence - SY0-601 CompTIA Security+ : 1.5.
Threat Research - SY0-601 CompTIA Security+ : 1.5.
Vulnerability Types - SY0-601 CompTIA Security+ : 1.6.
Third-party Risks - SY0-601 CompTIA Security+ : 1.6.
Vulnerability Impacts - SY0-601 CompTIA Security+ : 1.6.
Threat Hunting - SY0-601 CompTIA Security+ : 1.7.
Vulnerability Scans - SY0-601 CompTIA Security+ : 1.7.
Security Information and Event Management - SY0-601 CompTIA Security+ : 1.7.
Penetration Testing - SY0-601 CompTIA Security+ : 1.8.
Reconnaissance - SY0-601 CompTIA Security+ : 1.8.
Security Teams - SY0-601 CompTIA Security+ : 1.8.
Configuration Management - SY0-601 CompTIA Security+ : 2.1.
Protecting Data - SY0-601 CompTIA Security+ : 2.1.
Data Loss Prevention - SY0-601 CompTIA Security+ : 2.1.
Managing Security - SY0-601 CompTIA Security+ : 2.1.
Site Resiliency - SY0-601 CompTIA Security+ : 2.1.
Honeypots and Deception - SY0-601 CompTIA Security+ : 2.1.
Cloud Models - SY0-601 CompTIA Security+ : 2.2.
Edge and Fog Computing - SY0-601 CompTIA Security+ : 2.2.
Designing the Cloud - SY0-601 CompTIA Security+ : 2.2.
Infrastructure as Code - SY0-601 CompTIA Security+ : 2.2.
Virtualization Security - SY0-601 CompTIA Security+ : 2.2.
Secure Deployments - SY0-601 CompTIA Security+ : 2.3.
Provisioning and Deprovisioning - SY0-601 CompTIA Security+ : 2.3.
Secure Coding Techniques - SY0-601 CompTIA Security+ : 2.3.
Software Diversity - SY0-601 CompTIA Security+ : 2.3.
Automation and Scripting - SY0-601 CompTIA Security+ : 2.3.
Authentication Methods - SY0-601 CompTIA Security+ : 2.4.
Biometrics - SY0-601 CompTIA Security+ : 2.4.
Multi-factor Authentication - SY0-601 CompTIA Security+ : 2.4.
Disk Redundancy - SY0-601 CompTIA Security+ : 2.5.
Network Redundancy - SY0-601 CompTIA Security+ : 2.5.
Power Redundancy - SY0-601 CompTIA Security+ : 2.5.
Replication - SY0-601 CompTIA Security+ : 2.5.
Backup Types - SY0-601 CompTIA Security+ : 2.5.
Resiliency - SY0-601 CompTIA Security+ : 2.5.
Embedded Systems - SY0-601 CompTIA Security+ : 2.6.
Embedded Systems Communication - SY0-601 CompTIA Security+ : 2.6.
Embedded Systems Constraints - SY0-601 CompTIA Security+ : 2.6.
Physical Security Controls - SY0-601 CompTIA Security+ : 2.7.
Secure Areas - SY0-601 CompTIA Security+ : 2.7.
Secure Data Destruction - SY0-601 CompTIA Security+ : 2.7.
Cryptography Concepts - SY0-601 CompTIA Security+ : 2.8.
Symmetric and Asymmetric Cryptography - SY0-601 CompTIA Security+ : 2.8.
Hashing and Digital Signatures - SY0-601 CompTIA Security+ : 2.8.
Cryptographic Keys - SY0-601 CompTIA Security+ : 2.8.
Steganography - SY0-601 CompTIA Security+ : 2.8.
Quantum Computing - SY0-601 CompTIA Security+ : 2.8.
Stream and Block Ciphers - SY0-601 CompTIA Security+ : 2.8.
Blockchain Technology - SY0-601 CompTIA Security+ : 2.8.
Cryptography Use Cases - SY0-601 CompTIA Security+ : 2.8.
Cryptography Limitations - SY0-601 CompTIA Security+ : 2.8.
Secure Protocols - SY0-601 CompTIA Security+ : 3.1.
Endpoint Protection - SY0-601 CompTIA Security+ : 3.2.
Boot Integrity - SY0-601 CompTIA Security+ : 3.2.
Database Security - SY0-601 CompTIA Security+ : 3.2.
Application Security - SY0-601 CompTIA Security+ : 3.2.
Application Hardening - SY0-601 CompTIA Security+ : 3.2.
Load Balancing - SY0-601 CompTIA Security+ : 3.3.
Network Segmentation - SY0-601 CompTIA Security+ : 3.3.
Virtual Private Networks - SY0-601 CompTIA Security+ : 3.3.
Port Security - SY0-601 CompTIA Security+ : 3.3.
Secure Networking - SY0-601 CompTIA Security+ : 3.3.
Firewalls - SY0-601 CompTIA Security+ : 3.3.
Network Access Control - SY0-601 CompTIA Security+ : 3.3.
Proxy Servers - SY0-601 CompTIA Security+ : 3.3.
Intrusion Prevention - SY0-601 CompTIA Security+ : 3.3.
Other Network Appliances - SY0-601 CompTIA Security+ : 3.3.
Wireless Cryptography - SY0-601 CompTIA Security+ : 3.4.
Wireless Authentication Methods - SY0-601 CompTIA Security+ : 3.4.
Wireless Authentication Protocols - SY0-601 CompTIA Security+ : 3.4.
Installing Wireless Networks - SY0-601 CompTIA Security+ : 3.4.
Mobile Networks - SY0-601 CompTIA Security+ : 3.5.
Mobile Device Management - SY0-601 CompTIA Security+ : 3.5.
Mobile Device Security - SY0-601 CompTIA Security+ : 3.5.
Mobile Device Enforcement - SY0-601 CompTIA Security+ : 3.5.
Mobile Deployment Models - SY0-601 CompTIA Security+ : 3.5.
Cloud Security Controls - SY0-601 CompTIA Security+ : 3.6.
Securing Cloud Storage - SY0-601 CompTIA Security+ : 3.6.
Securing Cloud Networks - SY0-601 CompTIA Security+ : 3.6.
Securing Compute Clouds - SY0-601 CompTIA Security+ : 3.6.
Cloud Security Solutions - SY0-601 CompTIA Security+ : 3.6.
Identity Controls - SY0-601 CompTIA Security+ : 3.7.
Account Types - SY0-601 CompTIA Security+ : 3.7.
Account Policies - SY0-601 CompTIA Security+ : 3.7.
Authentication Management - SY0-601 CompTIA Security+ : 3.8.
PAP and CHAP - SY0-601 CompTIA Security+ : 3.8.
Identity and Access Services - SY0-601 CompTIA Security+ : 3.8.
Federated Identities - SY0-601 CompTIA Security+ : 3.8.
Access Control - SY0-601 CompTIA Security+ : 3.8.
Public Key Infrastructure - SY0-601 CompTIA Security+ : 3.9.
Certificates - SY0-601 CompTIA Security+ : 3.9.
Certificate Formats - SY0-601 CompTIA Security+ : 3.9.
Certificate Concepts - SY0-601 CompTIA Security+ : 3.9.
Reconnaissance Tools - Part 1 - SY0-601 CompTIA Security+ : 4.1.
Reconnaissance Tools - Part 2 - SY0-601 CompTIA Security+ : 4.1.
File Manipulation Tools - SY0-601 CompTIA Security+ : 4.1.
Shell and Script Environments - SY0-601 CompTIA Security+ : 4.1.
Packet Tools - SY0-601 CompTIA Security+ : 4.1.
Forensic Tools - SY0-601 CompTIA Security+ : 4.1.
Incident Response Process - SY0-601 CompTIA Security+ : 4.2.
Incident Response Planning - SY0-601 CompTIA Security+ : 4.2.
Attack Frameworks - SY0-601 CompTIA Security+ : 4.2.
Vulnerability Scan Output - SY0-601 CompTIA Security+ : 4.3.
SIEM Dashboards - SY0-601 CompTIA Security+ : 4.3.
Log Files - SY0-601 CompTIA Security+ : 4.3.
Log Management - SY0-601 CompTIA Security+ : 4.3.
Endpoint Security Configuration - SY0-601 CompTIA Security+ : 4.4.
Security Configurations - SY0-601 CompTIA Security+ : 4.4.
Digital Forensics - SY0-601 CompTIA Security+ : 4.5.
Forensics Data Acquisition - SY0-601 CompTIA Security+ : 4.5.
On-Premises vs. Cloud Forensics - SY0-601 CompTIA Security+ : 4.5.
Managing Evidence - SY0-601 CompTIA Security+ : 4.5.
Security Controls - SY0-601 CompTIA Security+ : 5.1.
Security Regulations and Standards - SY0-601 CompTIA Security+ : 5.2.
Security Frameworks - SY0-601 CompTIA Security+ : 5.2.
Security Configurations - SY0-601 CompTIA Security+ : 5.2.
Personnel Security - SY0-601 CompTIA Security+ : 5.3.
Third-party Risk Management - SY0-601 CompTIA Security+ : 5.3.
Managing Data - SY0-601 CompTIA Security+ : 5.3.
Credential Policies - SY0-601 CompTIA Security+ : 5.3.
Organizational Policies - SY0-601 CompTIA Security+ : 5.3.
Risk Management Types - SY0-601 CompTIA Security+ : 5.4.
Risk Analysis - SY0-601 CompTIA Security+ : 5.4.
Business Impact Analysis - SY0-601 CompTIA Security+ : 5.4.
Privacy and Data Breaches - SY0-601 CompTIA Security+ : 5.5.
Data Classifications - SY0-601 CompTIA Security+ : 5.5.
Enhancing Privacy - SY0-601 CompTIA Security+ : 5.5.
Data Roles and Responsibilities - SY0-601 CompTIA Security+ : 5.5.
Taught by
Professor Messer
Related Courses
AWS Security Fundamentals (Second Edition) (French)Amazon Web Services via AWS Skill Builder AWS Security Fundamentals (Second Edition) (Japanese)
Amazon Web Services via AWS Skill Builder AWS Security Fundamentals (Second Edition) (Spanish)
Amazon Web Services via AWS Skill Builder AWS Security Fundamentals (Second Edition) (Traditional Chinese)
Amazon Web Services via AWS Skill Builder Basics of Amazon Detective (French)
Amazon Web Services via AWS Skill Builder