Stone River eLearning – CompTIA Security + Certification (Exam number SY0-501)

$6.00

MAIL DELIVERY !!!

Please check your email ( spam, junk box) after your order

Link will be sent to you in an hour 

Description

Description

CompTIA Security + Certification (Exam number SY0-501) , Stone River eLearning – CompTIA Security + Certification (Exam number SY0-501) download

Stone River eLearning – CompTIA Security + Certification (Exam number SY0-501)

0. Proof

1. Course Introduction.ts

2. Courseware Information.ts

3. Instructor Introduction.ts

4. Identifying Security Fundamentals.ts

4. SecPlus_WB01.pdf

5. Topic A-Identify Info Com

7. Goals of Information Security.ts

8. Risk.ts

9. Vulnerabilities.ts

10. Threats.ts

11. Attacks.ts

12. Controls.ts

13. Types of Controls.ts

14. The Security Management Process.ts

15. Demo – Identifying Information Sercurity Basics.ts

16. Topic B- Identify Basic Sercurity Controls.ts

17. The CIA Triad.ts

18. The CIA Triad (cont.).ts

19. Non-repudiation.ts

20. Identification.ts

21. Authentication.ts

22. Authentication Factors.ts

23. Authorization.ts

24. Access Control.ts

25. Accounting and Auditing.ts

26. Principle of Least Privilege.ts

27. Privilege Management.ts

28. Demo – Identifying Basic Security Controls.ts

29. Topic C-Identify Basic Authentication and Authorization Concepts.ts

30. Passwords.ts

31. Tokens.ts

32. Biometrics.ts

33. Geolocation.ts

34. Keystroke Authentication.ts

35. Multi-factor Authentication.ts

36. Mutual Authentication.ts

37. Demo – Identifying Basic Authentication and Authorization Concepts.ts

38. Topic D- Identify Basic Cryptography Concepts.ts

39. Cryptography.ts

40. Encryption and Decryption.ts

41. Encryption and Decryption (cont.).ts

42. B Encryption and Security Goals.ts

43. Ciphers.ts

44. A Key.ts

45. Symmetric Encryption.ts

46. Asymmetric Encryption.ts

47. Asymmetric Encryption (cont.).ts

48. Hashing.ts

49. Steganography.ts

50. Demo Identifying Basic Cryptography Concepts.ts

51. Chapter 01 Review.ts

52. Analyzing Risk.ts

53. Topic A- Analyze Organizational Risk.ts

54. Risk Management.ts

55. Components of Risk Analysis.ts

56. Phases of Risk Analysis.ts

57. Categories of Threat Types.ts

58. Risk Analysis Methods.ts

59. Risk Calculation.ts

60. Risk Response Techniques.ts

61. Risk Mitigation and Control Types.ts

62. Change Management.ts

63. Change Management (cont.).ts

64. Guidelines for Analyzing Risk.ts

65. Demo – Analyzing Risk to the Organization.ts

66. Topic B- Analyze the Business Impact of Risk.ts

67. BIA.ts

68. Impact Scenarios.ts

69. Impact Scenarios (cont.1).ts

70. Impact Scenarios (cont.2).ts

71. Privacy Assessments.ts

72. Critical Systems and Functions.ts

74. Recovery Point Objective.ts

75. Recovery Time Objective.ts

76. Mean Time to Failure.ts

77. Mean Time to Repair.ts

78. Mean Time Between Failures.ts

79. Guidelines for Performing a Business Impact Analysis.ts

80. Demo – Performing a Business Impact Analysis.ts

81. Chapter 02 Review.ts

82. SecPlus_WB03.pdf

83. Topic A- Identify Types of Attackers.ts

84. Hackers and Attackers.ts

85. Hackers and Attackers (cont.).ts

86. Threat Actors.ts

87. Threat actors (cont.).ts

88. Threat Actor Attributes.ts

89. Threat Actor Attributes (cont.).ts

90. Open-Source Intelligence.ts

91. Demo – Identifying Types of Attackers.ts

92. Topic B- Identify Social Engineering Attacks.ts

93. Social Engineering.ts

94. Social Engineering (cont.).ts

95. Effectiveness.ts

96. Impersonation.ts

97. Phishing and Related Attacks .ts

98. Phishing and Related Attacks (cont.).ts

99. Hoaxes.ts

100. Physical Exploits.ts

101. Watering Hole Attacks.ts

102. Demo – Identifying Social Engineering Attacks.ts

103. Topic C- Identify Malware.ts

104. Malicious Code.ts

105. Malicious Code (cont).ts

106. Viruses.t

107. Worms.ts

108. Adware.ts

109. Spyware.ts

110. Trojan Horses.ts

111. Keyloggers.ts

112. Remote Access Trojans.ts

113. Logic Bombs.ts

114. Bonets.ts

115. Bonets (cont).ts

116. Ransomware.ts

117. Ransomware (cont).ts

118. Advance Persistent Threats.ts

119. Demo – Identifying Types of Malware.ts

120. Topic D – Identify Software-Based Threats.ts

121. Software Attacks.ts

122. Password Attacks.ts

123. Type of Password Attacks.ts

124. Type of Password Attacks (cont).ts

125. Cryptographic Attacks.ts

126. Types of Cryptographic Attacks.ts

127. Types of Cryptographic Attacks (cont.).ts

128. Backdoor Attacks.ts

129. Backdoor Attacks (cont.).ts

130. Application Attacks.ts

131. Application Attacks (cont.).ts

132. Types of Application Attacks.ts

133. Driver Manipulation.ts

134. Privilege Escalation.ts

135. Privilege Escalation (cont.).ts

136. Demo – Identifying Password Attacks.mp4

137. Topic E- Identify Network-Based Threats.ts

138. TCP-IP Basics.ts

139. TCP-IP (cont.).ts

140. Spoofing Attacks.ts

141. IP and MAC Address Spoofing.ts

142. IP and MAC Address Spoofing (cont.).ts

143. ARP Poisoning.ts

144. DNS Poisoning.ts

146. Port Scanning Attacks (cont.).ts

147. Scan Types.ts

148. Scan Types (cont.).ts

149. Eavesdropping Attacks.ts

150. Man-in-the-Middle Attacks.ts

151. Man-in-the-Middle Attacks (cont.).ts

152. Man-in-the-Browser Attacks.ts

153. Replay Attacks.ts

154. Replay Attacks (cont.).ts

155. DoS Attacks.ts

156. DDoS Attacks.ts

157. Hijacking Attacks.ts

158. Hijacking Attack(cont.).ts

159. Amplification Attacks.ts

160. Amplification Attacks (cont.).ts

161. Pass the Hash Attacks.ts

162. Demo – Identifying Threats to DNS.ts

163. Demo – Identifying Port Scanning Threats.ts

164. Topic F- Identify Wireless Threats.ts

165. Rogue Access Points.ts

166. Evil Twins.ts

167. Jamming.ts

168. Bluejacking.ts

169. Bluesnarfing.ts

170. Near Field Communication Attacks.ts

171. RFID System Attacks.ts

172. War Driving, War Walking, and War Chalking.ts

173. Packet Sniffing.ts

174. IV Attacks.ts

175. Wireless Replay Attacks.ts

176. WEP and WPA Attacks.ts

177. WPS Attacks.ts

178. Wireless Disassociation.ts

179. Demo – Identifying Wireless Threats.ts

180. Topic G- Identify Physical Threats.ts

181. Physical Threats and Vulnerabilities.ts

182. Hardware Attacks.ts

183. Environmental Threats and Vulnerabilis com

184 Environmental Threats and Vulnerabilities (cont.) .ts

185. Demo – Identifying Physical Threats.ts

186. Chapter 03 Review.ts

187. Conducting Security Assessments.ts

187. SecPlus_WB04.pdf

188. Topic A- Identify Vulnerabilities.ts

189. Host Vulnerabilities.ts

190. Software Vulnerabilities.ts

191. Encryption Vulnerabilities.ts

192. Network Architecture Vulnerabilities.ts

193. Account Vulnerabilities.ts

194. Operations Vulnerabilities.ts

195. Demo – Identifying Vulnerabilities.ts

196. Topic B- Assess Vulnerabilities.ts

197. Security Assessment.ts

198. Security Assessment Techniques.ts

199. Vulnerability Assessment Tools.ts

200. Types of Vulnerability Scans.ts

201. False Positives.ts

202. Wines for Assessing Vulnerability.ts

203. Demo – Capturing Network Data with Wireshark.mp4

204. Demo – Scanning for General Vulnerabilities.ts

205. Topic C- Implement Penetration Testing.ts

206. Penetration Testing.ts

207. Penetration Testing Techniques.ts

208. Box Testing Methods.ts

209. Penetration Testing Tools.ts

210. Guidelines for Implementing Penetration Testing.ts

211. Demo – Implementing Penetration Testing.ts

212 Chapter 04 Review.ts

213. Implementing Host and Software Security.ts

214. SecPlus WB05.pdf

214.Topic A Implement Host Security.ts

215. Hardening.ts

216. Operating System Security.ts

217. Operating System Hardening Techniques.ts

218. Trusted Computing Base.ts

219. Hardware and Firmware Security.ts

220. Hardware and Firmware Security (cont.).ts

221. Security Baselines.ts

224. Logging.ts

225. Auditing.ts

226. Anti-malware Software.ts

227. Types of Anti-malware Software.ts

228. Hardware Peripheral Security.ts

229. Embedded Systems.ts

230. Security Implications for Embedded Systems.ts

231. Security Implications for Embedded System (cont.).ts

232. Guidelines for Securing Hosts.ts 233. Demo Impleme Auditing.ts

234. Demo – Hardening a Server.ts

235. Topic B- Implement Cloud and Virtualization Security.ts

236. Virtualization.ts

237. Hypervisors.ts

238. Hypervisors (cont.).ts

239. Virtual Desktop Infrastructure.ts

240. Virtualization Security.ts

241. Cloud Computing.ts

242. Cloud Deployment Models.ts

243. Cloud Service Types.ts

244. Guidelines for Securing Virtualized and Cloud-Based Resources.ts

245. Demo – Securing

246. Topic C-Implement Mobile Device Security.ts

247. Mobile Device Connection Methods.ts

248. Mobile Device Connection Methods (cont.).ts

249. Mobile Device Management.ts

250. Mobile Device Security Controls.ts

251. Mobile Device Security Controls (cont.).ts

252. Mobile Device Monitoring and Enforcement.ts

253. Mobile Device Monitoring and Enforcement (cont.).ts

254. Mobile Deployment Models.ts

255. BYOD Security Controls.ts

256. Guidelines for Implementing Mobile Device Security.ts

257. Demo – Implementing Mobile Device Security.ts

258. Topic D- Incorporate Security in the Software Development Lifecycle.ts

259. Software Development Lifecycle.ts

260. Software Development Models.ts

261. DevOps.ts

262. Versioning.ts

263. Secure Coding Techniques.ts

264. Secure Coding Techniques (cont.).ts

265. Code Testing Methods.ts

266. Guidelines for Incorporating Static Code Analysis.ts

267. Demo – Performing Static Code Analysis.ts

269 Chapter 05 Review.ts

269. SecPlus_WB06.pdf

270. Topic A-Configure Network Security Technologies.ts

271. Network Components.ts

272. Network Devices.ts

273. Routers.ts

274. Switches.ts

275. Proxies.ts

276. Firewalls.ts

277. Load Balancer.ts

278. Network Scanners and Analysis Tools.ts

279. Intrusion Detection Systems.ts

280. Network IDS.ts

281. Intrusion Preventab.com

282. Network IPS.ts

283. Types of Network Monitoring Systems.ts

284. Security Information and Event Management.ts

285. Data Loss-Leak Prevention.ts

286. Virtual Private Networks.ts

287. VPN Concentrators.ts

288. Security Gateways.ts

289. Unified Threat

290. Guidelines for Configuring Network Security Technologies.ts

291. Demo – Configuring a Network IDS.ts

292. Topic B-Secure Network Design Elements.ts

293. Network Access Control.ts

294. Demilitarized Zones.ts

295. Network Isolation.ts

296. Network Isolation (cont.).ts

297. Virtual Local Area Networks.ts

298. Virtual Local Area Networks (cont.)K.ts ha

299. Network Security Device Placement.ts

300. Network Address Translation.ts

301. Software-Defined Networking.ts

302. Guidelines for Securing  Network Design Elements.ts

303. Demo – Securing NewTech Network Design Elements.ts

304. Topic C- Implement Secure Networking Protocols and Services.ts

305. The Open Systems Interconnection Model.ts

306. OSI Model and Security.ts

307. Internet Protocoal Suite.ts

308. Domain Name System.ts

309. Hypertext Transfer Protocol.ts

310. Secure Sockets Layer-Transport Layer Security.ts

311. Secure Sockets Layer-Transport Layer Security (cont.).ts

312. HTTP Secure.ts

313. Secure Shell.ts

314. Simple Network Management Protocol.ts

315. Real-Time Transport Protocol.ts

316. Internet Control Message Protocol.ts

317. Internet Protocol Security.ts

318. Network Basic Input-Output System.ts

319. File Trans Protocol.ts

320. Email Protocols.ts

321. Additional Networking Protocols and Services.ts

322. Ports and Port Ranges.ts

323. Demo – Installing an Internet Information Services Web Server with Basic Security.ts

324. Demo – Securing Network Traffic Using IPSec.ts

325. Topic D-Secure Wireless Traffic.ts

326. Wireless Networks.ts

327. Wireless Antenna Types.ts

328. 802.11 Protocols.ts

329. Wireless Cryptographic Protocols.ts

330. Wireless Authentication Protocols.ts

331. VPNs and Open Wireless.ts

332. Wireless Client Authentication Method.ts

333. Wireless Access Point Security.ts

334. Captive Portals.ts

335. Site Surveys.ts

336. Guidelines for Securing Wireless Traffic.ts

337. Demo – Securing Wireless Traffic.ts

338. Chapter 06 Review.ts

338. Managing Identify and Access.ts

338. SecPlus_WB07.pdf

339. Topic A- Implement Identity and Access Management.ts

340. Identity and Access Management.ts

341. Access Control Models.ts

342. Physical Access Control Models.ts

343. Biometric Devices.ts

344. Certificate-Based Authentication.ts

345. File System and Database Access.ts

346. Guidelines for Implementing IAM.ts

347. Demo – Implementing DAC for a File Share.ts

348. Topic B-Configure Directory Services.ts

349. Directory Services.ts

350. Directory Services (cont.).ts

351. Lightweight Directory Access Protocol.ts

352. Secure LDAP.ts

353. Common Directory Services.ts

354. Demo – Backing Up Active Directory.ts

355. Topic C-Configure Access Services.ts

356. Remote Access Methods.ts

357. Tunneling.ts

358. Remote Access Methods.ts

359. HMAC-Based One-Time Password.ts

360. Time-Based OTP.ts

361. Password Authentication Protocol.ts

362. Challenge-Handshake Authentication Protocol.ts

363. NT LAN Manager.ts

364. Authentication- Authorization- and Accounting.ts

365. Remote Authentication Dial-In User Service.ts

366. Remote Authentication Dial-In User Service (cont.).ts

367. Terminal Access Controller Access-Control System.ts

368. Kerberos.ts

369. Kerberos (Cont.).ts

370. Demo – Configuring a Remote Access Server.ts

371. Demo – Setting Up Remote Access Authentication.ts

372. Topic D- Manage Accounts.ts

373. Account Management.ts

374. Account Privileges.ts

375. Account Types.ts

376. Account Types.ts

377. Password Policy.ts

378. Multiple Accounts.ts

379. Shared Accounts.ts

380. Account Managemenr Security Controls.ts

381. Credential Management.ts

382. Group Policy.ts

383. Identity Federation Methods.ts

383. Identity Federation.ts

384. Guidelines for Managing Accounts.ts

385. Demo – Managing Accounts.ts

386. Chapter 07 Review.ts

387.Implementing Crytography.ts

387. SecPlus_WB08.pdf

388. Topic A- Identify Advanced Cryptography Concepts.ts

389. Cryptography Elements.ts

390. Hashing Cincepts.ts

391. Data States.ts

392. Key Exchange.ts

393. Key Exchange (cont.).ts

394. Digital Signatures.ts

395. Digital Signatures (cont.).ts

396. Cipher Suites.ts

397. Session Keys.ts

398. Key Stretching.ts

399. Special Considerations for Cryptography.ts

400. Demo – Identifying Advanced Cryptographic Concepts.ts

401. Topic B- Select Cryptographic Algorithms.ts

402. Types of Ciphers.ts

403. Types of Hashing Algorithms.ts

404. Types of Symmetric Encryption Algorithms.ts

405. Types of Asymmetric Encryption Techniques.ts

406. Types of Key Stretching Algorithms.ts

407. Subsititution Ciphers.ts

408. Exclusive Or.ts

409. Cryptographic Modules.ts

410. Demo – Selecting Cryptographic Algorithms.ts

411. Topic C- Configure a Public Key Infrastructure.ts

412. Public Key Infrastructure.ts

413. PKI Components.ts

414. CA Hierarchies.ts

415. The Root CA.ts

417. Offline Root CAs.ts

418. Types of Certificates.ts

419. Types of Certificates (cont.).ts

420. X.509.ts

421. Certificate File Formats.ts

422. CA Hierarchy Design Options.ts

423. Demo – Installing a CA.ts

433. Demo – Securing a Windows Server 2016 CA.ts

434. Topic D – Enroll Certificates.ts

435. The Certificate Enrollment Process.ts

436. The Certificate Lifecycle.ts

437. Certificate Lifecycle Management.ts

438. The SSL-TLS Connection Process.ts

439. Demo – Enrolling Certificates.ts

440. Demo – Securing Network Traffic with Certificates.ts

441. Topic E- Back Up and Restore Certificates and Private Keys.ts

442. Private Key Protection Methods.ts

443. Ket Escrow.ts

444. Private Key Restoration Methods.ts

445. Private Key Replacement.ts

447. Demo – Backing Up a Certificate and Private Key.ts

448. Demo – Restoring a Certificate and Private Key.ts

449. Topic F – Revoke Certificate.ts

450. Certificate Revocation.ts

451. Certificate Revocation List.ts

452. Certificate Revocation List (cont.).ts

453 Online Certificate Status Protocol.ts

454. Demo – Revokes Certificates.ts

455. Chapter 08 Review.ts

456. Implementing Operational Security.ts

456. SecPlus_WB09.pdf

457. Topic A- Evaluate Security Frameworks and Guidelines.ts

458. Security Frameworks.ts

459. Security Framework Examples.ts

460. Security Configuration Guides.ts

461. Compliance.ts

462. Layered Security.ts

463. Defense in Depth.ts

464. Demo – Evaluating Security Frameworks and Guidelines.ts

465. Topic B- Incorporate Documentation in Operational Security.ts

466. Security Policies.ts

467. Security Policies (cont.).ts

468. Common Security Policy Types.ts

469. Personnel Management.ts

470. Separation of Duties.ts

471. Job Rotation.ts

472. Mandatory Vacation.ts

473. Additional Personnel Manament Tasks.ts

474. Training and Awareness.ts

475. Business Agreements.ts

476. Guidelines for Incorporating Documentation in Operational Security.ts

477. Demo – Incorporating Documentation in Operational Security.ts

478. Topic C-Implement Security Strategies.ts

479. Security Automation.ts

480. Scalability.ts

481. Scalability.ts

481. Elasticity.ts

482. Redundancy.ts

483. Fault Tolerance.ts

484. Redundant Array of Independent Disks.ts

485. Non-persistence.ts

486. High Availability.ts

487. Deployment Environments.ts

488. Guidelines for Implementing Security Strategies.ts

489. Demo – Implementing Virtual Machine Snapshots.ts

490. Topic D- Manage Data Security Processes.ts

491. Data Security.ts

492. Data Security Vulnerabilities.ts

493. Data Storage Methods.ts

494. Data Encryption Methods.ts

495. Data Sensitivity.ts

496. Data Management Roles.ts

497. Data Retention.ts

498. Data Disposal.ts

499. Guidelines for Managing Data Security.ts

500. Demo – Destroying Data Securely.ts

501. Demo – Encrypting a Storage Device Teachab.com

502. Topic E- Implement Physical Controls.ts

503. Physical Security Controls.ts

504. Physical Security Controls Types.ts

505. Physical Security Controls Types (cont. Part 1).ts

506. Physical Security Controls Types (cont. Part 2).ts

507. Physical Security Controls Types (cont. Part 3).ts

508. Environmental Exposures.ts

509. Environmental Controls.ts

510. Environmental Controls(cont. ).ts

511. Environmental Monitoring.ts

512. Safety.ts

513. Guidelines for Implementing Physical Controls.ts

514. Demo- Implementinf Physical Control.ts

515. Chapter 09 Review.ts

516. Addressing Security Issues.ts

516. SecPlus_WB10.pdf

517. Topic A- Troubleshoot Common Security Issues.ts

518. Access Control Issues.ts

519 Encryption Issues.ts

520. Data Exfiltration.ts

521. Anomalies in Event Logs.ts

522. Security Configuration Issues.ts

523. Baseline Deviations.ts

524. Software Issues.ts

525. Personnel Issues.ts

526. Asset Management Issues.ts

527. Demo – Identifying Event Log Anomalies.ts

528. Topic B- Respond to Security Incidents.ts

529. Incident Response.ts

530. Incident Preparation.ts

531. Incident Detection and Analysis.ts

532. Incident Containment.ts

533. Incident Eradication.ts

534. Incident Recovery.ts

535. Lessons Learned.ts

536. Incident Response Plans.ts

537. First Responders.ts

538. An Incident Report.ts

539. Guidelines for Responding to Security Incidents.ts

540. Demo – Responding to a Security Incident.ts

541. Topic C- Investigateity Incidents.ts

542. Computer Forensics.ts

543. The Basic Forensic Process.ts

544. Preservation of Forensic Data.ts

545. Basic Forensic Response Procedure.ts

546. Basic Forensic Response Procedure (com

547. Order of Volatility.ts

548. Chain of Custody.ts

549. Guidelines for Investigating Security Incidents.ts

550. Demo – Implementing Forensic Procedures.ts

551. Chapter 10 Review.ts

552. Ensuring Business Continuity.ts

552. SecPlus_WB11.pdf

553. Topic A- Select Business Continuity and Disaster Recovery Processes.ts

554. Business Continuity and Disaster Recovery.ts

555. The Disaster Recovery Process.ts

556. Recovery Team.ts

557. Order of Restoration.ts

558. Recovery Sites.ts

559. Secure Recovery.ts

561. Backup Types (Differential vs. Incremental).ts

562. Secure Backups.ts

563. Geographic Considerations.ts

564. Guidelines for Selecting Continuity and Disasrer Recovery Processes.ts

565. Demo-Selecting Bess Continuity and Disaster Recovery Processes.ts

566. Topic B- Develop a Business Continuity Plan.ts

567. Business Continuity Plans.ts

568. Business Continuity Plans (cont.).ts

569. Disaster Recovery Plans.ts

570. Disaster Recovery Plans (cont.).ts

571. IT Contingency Plans.ts

572. Succession Plans.ts

573. Failover.ts

574. Alternate Business Practices.ts

575. Testing Exercises.ts

576. After-Action Reports.ts

577. Guidelines for Developing a BCP.ts

578. Demo – Developing a BCP.ts

579. Chapter 11 Review.ts

Commonly Asked Questions:

  1. Business Model Innovation: Acknowledge the reality of a legitimate enterprise! Our approach involves the coordination of a collective purchase, in which the costs are shared among the participants. We utilize this cash to acquire renowned courses from sale pages and make them accessible to individuals with restricted financial resources. Our clients appreciate the affordability and accessibility we provide, despite the authors’ concerns.
  2. CompTIA Security + Certification (Exam number SY0-501) Course
  • There are no scheduled coaching calls or sessions with the author.
  • Access to the author’s private Facebook group or web portal is not permitted.
  • No access to the author’s private membership forum.
  • There is no direct email support available from the author or their team.
Reviews (0)

Reviews

There are no reviews yet.

Be the first to review “Stone River eLearning – CompTIA Security + Certification (Exam number SY0-501)”

Your email address will not be published.