SY0-501: CompTIA Security+

SY0-501: CompTIA Security+

BEST SELLER 222 Lectures 14h 34m 26s

Prepare for your CompTIA examination with our training course. The SY0-501 course contains a complete batch of videos that will provide you with profound and thorough knowledge related to CompTIA certification exam. Pass the CompTIA SY0-501 test with flying colors.

$24.99 $32.49

Curriculum For This Course

7 lectures 23m 24s
  • 1. Overview of Security
    2m 55s
  • 2. CIA Triad
    3m 54s
  • 3. AAA of Security
    3m 5s
  • 4. Security Threats
    2m 57s
  • 5. Mitigating Threats
    2m 28s
  • 6. Hackers
    4m 53s
  • 7. Threat Actors
    3m 12s

10 lectures 31m 49s
  • 1. Malware
    39s
  • 2. Viruses
    6m 21s
  • 3. Worms
    2m 9s
  • 4. Trojans
    2m 48s
  • 5. Demo: Viruses and Trojans
    6m 16s
  • 6. Ransomware
    2m 30s
  • 7. Spyware
    2m 39s
  • 8. Rootkits
    3m 29s
  • 9. Spam
    2m 56s
  • 10. Summary of Malware
    2m 2s

9 lectures 38m 9s
  • 1. Malware Infections
    4m 12s
  • 2. Common Delivery Methods
    3m 23s
  • 3. Botnets and Zombies
    3m 30s
  • 4. Active Interception and Privilege Escalation
    2m 28s
  • 5. Demo: Privilege Escalation
    5m 41s
  • 6. Backdoors and Logic Bombs
    3m 48s
  • 7. Symptoms of Infection
    4m 10s
  • 8. Removing Malware
    5m 1s
  • 9. Preventing Malware
    5m 56s

9 lectures 35m 41s
  • 1. Security Applications and Devices
    33s
  • 2. Software Firewalls
    4m 16s
  • 3. Demo: Software Firewalls
    6m 44s
  • 4. IDS
    5m 3s
  • 5. Pop-up Blockers
    3m 9s
  • 6. Data Loss Prevention (DLP)
    3m 43s
  • 7. Securing the BIOS
    3m 56s
  • 8. Securing Storage Devices
    3m 26s
  • 9. Disk Encryption
    4m 51s

9 lectures 32m 14s
  • 1. Mobile Device Security
    1m 14s
  • 2. Securing Wireless Devices
    1m 30s
  • 3. Mobile Malware
    6m 19s
  • 4. SIM Cloning & ID Theft
    4m
  • 5. Bluetooth Attacks
    2m 8s
  • 6. Mobile Device Theft
    3m 10s
  • 7. Security of Apps
    5m 6s
  • 8. BYOD
    4m 56s
  • 9. Hardening Mobile Devices
    3m 51s

10 lectures 32m 37s
  • 1. Hardening
    1m 47s
  • 2. Unnecessary Applications
    3m 10s
  • 3. Restricting Applications
    2m 56s
  • 4. Demo: Unnecessary Services
    5m 35s
  • 5. Trusted Operating System
    1m 57s
  • 6. Updates and Patches
    3m 26s
  • 7. Patch Management
    3m 49s
  • 8. Group Policies
    2m 33s
  • 9. Demo: Group Policies
    4m 6s
  • 10. File Systems and Hard Drives
    3m 18s

6 lectures 21m 34s
  • 1. Virtualization
    2m 7s
  • 2. Hypervisors
    2m 37s
  • 3. Demo: How to create a VM
    4m 39s
  • 4. Threats to VMs
    3m 43s
  • 5. Securing VMs
    3m 47s
  • 6. Demo: Securing VMs
    4m 41s

5 lectures 21m 50s
  • 1. Application Security
    1m 43s
  • 2. Web Browser Security
    6m 39s
  • 3. Web Browser Concerns
    3m 19s
  • 4. Demo: Web Browser Configuration
    5m 20s
  • 5. Securing Applications
    4m 49s

9 lectures 53m 48s
  • 1. Software Development
    8m 34s
  • 2. SDLC Principles
    6m 22s
  • 3. Testing Methods
    6m 59s
  • 4. Software Vulnerabilities and Exploits
    2m 28s
  • 5. Buffer Overflows
    6m 15s
  • 6. Demo: Buffer Overflow Attack
    6m 25s
  • 7. XSS and XSRF
    3m 7s
  • 8. SQL Injection
    6m 25s
  • 9. Demo: SQL Injection
    7m 13s

10 lectures 30m 34s
  • 1. Network Security
    44s
  • 2. The OSI Model
    6m
  • 3. Switches
    3m 32s
  • 4. Routers
    2m 27s
  • 5. Network Zones
    3m 26s
  • 6. Network Access Control
    2m 40s
  • 7. VLANs
    1m 30s
  • 8. Subnetting
    1m 51s
  • 9. Network Address Translation
    2m 26s
  • 10. Telephony
    5m 58s

8 lectures 26m 3s
  • 1. Perimeter Security
    46s
  • 2. Firewalls
    8m 1s
  • 3. Demo: SOHO Firewall
    4m 4s
  • 4. Proxy Servers
    4m 12s
  • 5. Honeypots and Honeynets
    1m 22s
  • 6. Data Loss Prevention
    1m 35s
  • 7. NIDS and NIPS
    4m 11s
  • 8. Unified Threat Management
    1m 52s

5 lectures 20m 21s
  • 1. Cloud Computing
    3m 29s
  • 2. Cloud Types
    2m 51s
  • 3. As a Service
    7m 4s
  • 4. Cloud Security
    2m 25s
  • 5. Defending Servers
    4m 32s

14 lectures 44m 41s
  • 1. Network Attacks
    38s
  • 2. Ports and Protocols
    54s
  • 3. Memorization of Ports
    11m 30s
  • 4. Unnecessary Ports
    3m 21s
  • 5. Denial of Service
    7m 56s
  • 6. DDoS
    1m 36s
  • 7. Stopping a DDoS
    2m 27s
  • 8. Spoofing
    1m 16s
  • 9. Hijacking
    3m 45s
  • 10. Replay Attack
    1m 27s
  • 11. Demo: Null Sessions
    2m 24s
  • 12. Transitive Attacks
    1m 24s
  • 13. DNS Attacks
    4m 33s
  • 14. ARP Poisoning
    1m 30s

9 lectures 49m 38s
  • 1. Securing Networks
    49s
  • 2. Securing Network Devices
    6m 43s
  • 3. Securing Network Media
    8m 48s
  • 4. Securing WiFi Devices
    4m 22s
  • 5. Wireless Encryption
    5m 30s
  • 6. Wireless Access Points
    6m 11s
  • 7. Wireless Attacks
    4m 15s
  • 8. Demo: Wireless Attack
    6m 58s
  • 9. Other Wireless Technologies
    6m 2s

5 lectures 13m 59s
  • 1. Physical Security
    1m 30s
  • 2. Surveillance
    2m 51s
  • 3. Door Locks
    3m 47s
  • 4. Demo: Lock Picking
    1m 36s
  • 5. Biometric Readers
    4m 15s

5 lectures 13m 57s
  • 1. Facilities Security
    36s
  • 2. Fire Suppression
    6m 21s
  • 3. HVAC
    2m 23s
  • 4. Shielding
    2m 34s
  • 5. Vehicles
    2m 3s

9 lectures 28m 38s
  • 1. Authentication
    5m 53s
  • 2. Authentication Models
    5m 17s
  • 3. 802.1x
    3m 44s
  • 4. LDAP and Kerberos
    2m 26s
  • 5. Remote Desktop Services
    1m 51s
  • 6. Remote Access Service
    2m 3s
  • 7. VPN
    3m 2s
  • 8. RADIUS vs TACACS+
    2m 18s
  • 9. Authentication Summary
    2m 4s

8 lectures 36m 44s
  • 1. Access Control
    50s
  • 2. Access Control Models
    8m 14s
  • 3. Best Practices
    5m 44s
  • 4. Users and Groups
    9m 12s
  • 5. Permissions
    3m 41s
  • 6. Usernames and Passwords
    2m 36s
  • 7. Demo: Policies
    4m 34s
  • 8. User Account Control
    1m 53s

13 lectures 1h 15m 19s
  • 1. Risk Assessments
    8m 33s
  • 2. Qualitative Risk
    4m 6s
  • 3. Quantitative Risk
    5m 27s
  • 4. Methodologies
    2m 49s
  • 5. Security Controls
    6m 49s
  • 6. Vulnerability Management
    7m 50s
  • 7. Penetration Testing
    4m 26s
  • 8. OVAL
    1m 34s
  • 9. Vulnerability Assessments
    6m 52s
  • 10. Demo: Nmap Scanning
    8m 50s
  • 11. Demo: Vulnerability Scanning
    9m 33s
  • 12. Password Analysis
    5m 54s
  • 13. Demo: Password Cracking
    2m 36s

10 lectures 36m 8s
  • 1. Monitoring Types
    2m 54s
  • 2. Performance Baselining
    4m 35s
  • 3. Protocol Analyzers
    2m 58s
  • 4. SNMP
    3m 40s
  • 5. Demo: Analytical Tools
    4m 27s
  • 6. Auditing
    1m 54s
  • 7. Demo: Auditing Files
    3m 53s
  • 8. Logging
    3m 39s
  • 9. Log Files
    5m 14s
  • 10. SIEM
    2m 54s

12 lectures 47m 24s
  • 1. Cryptography
    4m 56s
  • 2. Symmetric vs Asymmetric
    6m 12s
  • 3. Symmetric Algorithms
    4m 56s
  • 4. Public Key Cryptography
    3m 9s
  • 5. Asymmetric Algorithms
    3m 44s
  • 6. Pretty Good Privacy
    1m 46s
  • 7. Key Management
    2m 11s
  • 8. One-Time Pad
    4m 18s
  • 9. Hashing
    8m 27s
  • 10. Demo: Hashing
    3m 4s
  • 11. Hashing Attacks
    3m 15s
  • 12. Increasing Hash Security
    1m 26s

5 lectures 20m 53s
  • 1. Public Key Infrastructure
    3m 53s
  • 2. Digital Certificates
    6m 42s
  • 3. Demo: Certificates
    3m 31s
  • 4. Certificate Authorities
    4m 12s
  • 5. Web of Trust
    2m 35s

6 lectures 18m 20s
  • 1. Security Protocols
    21s
  • 2. S/MIME
    1m 29s
  • 3. SSL and TLS
    5m 48s
  • 4. SSH
    2m 28s
  • 5. VPN Protocols
    6m 37s
  • 6. Demo: Setting up a VPN
    1m 37s

11 lectures 35m 7s
  • 1. Planning for the Worst
    2m 9s
  • 2. Redundant Power
    3m 8s
  • 3. Backup Power
    3m 6s
  • 4. Data Redundancy
    4m 39s
  • 5. Demo: RAIDs
    3m 35s
  • 6. Network Redundancy
    2m 4s
  • 7. Server Redundancy
    1m 42s
  • 8. Redundant Sites
    2m 20s
  • 9. Data Backup
    2m 54s
  • 10. Tape Rotation
    3m 52s
  • 11. Disaster Recovery Plan
    5m 38s

6 lectures 17m 13s
  • 1. Social Engineering
    52s
  • 2. Demo: Pretexting
    4m 14s
  • 3. Insider Threat
    2m 10s
  • 4. Phishing
    1m 13s
  • 5. More Social Engineering
    4m
  • 6. User Education
    4m 44s

11 lectures 1h 4m 12s
  • 1. Policies and Procedures
    5m 53s
  • 2. Data Classifications
    6m 42s
  • 3. PII and PHI
    6m 19s
  • 4. Security Policies
    10m 19s
  • 5. User Education
    4m 2s
  • 6. Vendor Relationships
    7m 52s
  • 7. Disposal Policies
    5m 4s
  • 8. Incident Response Procedures
    4m 36s
  • 9. Data Collection Procedures
    3m 11s
  • 10. Demo: Disk Imaging
    6m 56s
  • 11. IT Security Frameworks
    3m 18s

1 lectures 4m 9s
  • 1. Exam Tricks
    4m 9s
VTSimu
VTSimu Exam Simulator
How to open .dumpsarena files

Use Free VTSimu Exam Simulator to open .dumpsarena files

VTSimu Exam Simulator

Satisfaction Guaranteed

98.4% DumpsArena users pass

Our team is dedicated to delivering top-quality exam practice questions. We proudly offer a hassle-free satisfaction guarantee.

Why choose DumpsArena?

23,812+

Satisfied Customers Since 2018

  • Always Up-to-Date
  • Accurate and Verified
  • Free Regular Updates
  • 24/7 Customer Support
  • Instant Access to Downloads
Secure Experience

Guaranteed safe checkout.

At DumpsArena, your shopping security is our priority. We utilize high-security SSL encryption, ensuring that every purchase is 100% secure.

SECURED CHECKOUT
Need Help?

Feel free to contact us anytime!

Contact Support