Course Highlights
  • CompTIA Security+ exam objectives
  • Attacks against networks
  • Methods to protect a network
  • Full length Mock Exam
  • Introduction to ethical hacking
Curriculum

6 Topics
About Me
Exam Information
My Experience Taking the Exam
Building a lab
Join me for a Live Q and A Session
MUST WATCH: Exam Objectives and layout of this course.

3 Topics
CIA Triade
IAAA
Basic security controls

7 Topics
Phishing Smishing Vishing Spear phishing Whaling
Dumpster diving and Shoulder surfing
Eliciting information and the principles of social engineering
Pharming
Spam
Tailgating
Other types Social Engineer techniques

12 Topics
Introduction to Malware
Ransomeware and Cryptomalware
Trojans and RAT's
Bot and Command and control
Fileless Virus Logic bombs spyware rootkit backdoor
Adversarial artificial intelligence (AI)
Malicious USB cables drives and Card Cloning
Supply chain attacks
Keyloggers
How passwords are stored
Using hashcat to crack passwords
Using a brute force and rainbow tables to attack passwords

8 Topics
Privilege escalation (SSL) stripping Pass the hash
Cross-site scripting (XSS) and Injections
Pointer Dereference directory traversal buffer overflows and tocttou
Replay attacks
Request forgeries
API Attacks
Driver manipulation
Integer overflow Resource exhaustion Memory leak

9 Topics
Evil Twin and Rouge Access Point
Bluesnarfing and Bluejacking
Cracking WEP
Disassociation and Jamming
Man in the Middle browser and APR Poisoning
IV RFID NFC Attacks
MAC Flooding and Cloning
DDOS Attacks
Malicious Code

3 Topics
Actors and threats
Threat intelligence sources
Research sources

4 Topics
Cloud-based vs. on-premises Zero Day
Weak configurations
Third-party risks Improper or weak patch legacy platforms
Impacts

3 Topics
Threat hunting
Vulnerability scans
SIEM and SOAR

3 Topics
Penetration testing
Passive and active reconnaissance
Exercise types

1 Topic
Quiz

5 Topics
Configuration management
Data Sovereignty and Protection
Other Security Consideration
Site Resiliency Hot Warm Cold
Deception and disruption

7 Topics
IaaS
PaaS
SaaS XaaS
Cloud Deployment
Cloud Application terms
IaC
Virtualization Issues

3 Topics
Software Development Environment
Secure Coding Techniques
DevOps and Automation

4 Topics
Authentication methods
Biometrics
MFA
Authentication authorization and accounting

5 Topics
Redundancy
Replication and storages
Backup Types
Non-persistence high availability diversity
RAID

4 Topics
Embedded Systems
Industrial control system
IoT
IoT Communication and considerations

5 Topics
Physical Security Controls
Other physical security controls
Locks and Fencings
Fire Suppression
Secure data destruction

21 Topics
Introduction to cryptography
Goals of cryptography
Algorithm and Keys
Block and stream ciphers
Symmetric Ciphers
Asymmetric Ciphers
Hashing
Hybrid cryptography
Digital signatures
Block Chain
Steganography
Key stretching
Salting
Quantum
Ephemeral PFS Homomorphic
Cipher Modes
Lightweight cryptography
Elliptic-curve cryptography
Cipher suites
Common use cases
Limitations of encryptions

1 Topic
Quiz

10 Topics
DNSSEC
Email security with S/MIME and PMP
Installing Wireshark on Windows 10
Install and setup an FTP Server and Client
Using Wireshark to capture an FTP Password and securing FTP Server
Lightweight Directory Access Protocol Over SSL
SRPT FTPS SFTP SNMP IMAP
SSH
VPN and IPSEC
Use Cases for secure protocols

6 Topics
Endpoint Protection
Boot integrity
Databases
Application Security
Hardening systems
Drive Encryption and sandboxing

9 Topics
Load Balancing
Network segmentation
How to download and install packet tracer
VLAN's and Port Security
Firewalls
Configuring firewall rules
Jump and Proxy servers
IDS and IPS
Other network secure concepts

2 Topics
Wireless Security
Wireless Installation Considerations

5 Topics
Mobile Connection methods and receivers
Mobile device management (MDM)
UEM and MAM
Enforcement and monitoring of mobile devices
Mobile Deployment Models

3 Topics
Cloud Solutions controls
Cloud Network and computing
Cloud Security terms

2 Topics
Identity and account types
Account policies

3 Topics
Authentication management
Authentication Protocols
Access control schemes

6 Topics
Introduction to PKI
Process of getting a certificate
PKI Setup
Fields on a certificate
Certificate formats
Certificate types

1 Topic
Quiz

20 Topics
Introductions to commands
ARP and Route
hping
Curl
IP scanner
ipconfig ping tracert
Linux file manipulation head tail cat
Log
Cuckoo
thehavester
Nslookup and Dig
tcpdump
NetCat
Sniper
scanless
nmap
Managing Linux Permissions
Shell and script environments
Exploitation frameworks
Forensics tools

3 Topics
Incident response process
Attack Frameworks
Incidents plans and exercises

2 Topics
Log Files
Capture log files

1 Topic
Incident mitigation techniques

3 Topics
Documentation and evidence
Integrity of evidence
Order of volatility

1 Topic
Quiz

1 Topic
Control Types and category

3 Topics
Regulations standards and legislation
Key frameworks
Secure configuration guides

3 Topics
Personnel Controls
Third-party risk management
Credential and organizations policies

4 Topics
Risk types terms and Process
Risk management strategies
Risk Assessments
Business impact analysis

3 Topics
Privacy breaches
Data types
Privacy technologies and roles

1 Topic
Quiz

5 Topics
Performance Based Questions Introduction
PBQ - Attack Types and Response
PBQ - Incident Response
PBQ - Social Engineering
PBQ - Firewalls

1 Topic
Final Practice Exam

1 Topic
The End

  Write a Review

CompTIA Security+ SY0-601 Lab Course with Simulations/PBQ

Go to Paid Course