SY0-601: CompTIA Security+ 2021
Prepare for your CompTIA examination with our training course. The SY0-601 course contains a complete batch of videos that will provide you with profound and thorough knowledge related to CompTIA certification exam. Pass the CompTIA SY0-601 test with flying colors.
Curriculum For This Course
-
1. SY0-501 vs1m
-
2. Exam Information6m
-
3. Building a lab8m
-
1. CIA Triade5m
-
2. IAAA5m
-
3. Basic security controls2m
-
1. Phishing, Smishing, Vishing, Spear phishing, Whaling11m
-
2. Dumpster diving and Shoulder surfing5m
-
3. Eliciting information and the principles of social engineering9m
-
4. Pharming7m
-
5. Spam4m
-
6. Tailgating3m
-
7. Other types Social Engineer techniques15m
-
1. Introduction to Malware2m
-
2. Ransomeware and Cryptomalware7m
-
3. Trojans and RAT's6m
-
4. Bot and Command and control4m
-
5. Fileless Virus, Logic bombs, spyware, rootkit, backdoor5m
-
6. Adversarial artificial intelligence (AI)6m
-
7. Malicious USB cables, drives and Card Cloning4m
-
8. Supply chain attacks4m
-
9. Keyloggers16m
-
10. How passwords are stored5m
-
11. Using hashcat to crack passwords7m
-
12. Using a brute force and rainbow tables to attack passwords11m
-
1. Privilege escalation, (SSL) stripping, Pass the hash11m
-
2. Cross-site scripting (XSS) and Injections16m
-
3. Pointer Dereference, directory traversal, buffer overflows, and tocttou12m
-
4. Replay attacks4m
-
5. Request forgeries9m
-
6. API Attacks7m
-
7. Driver manipulation5m
-
8. Integer overflow, Resource exhaustion, Memory leak6m
-
1. Evil Twin and Rouge Access Point6m
-
2. Bluesnarfing and Bluejacking3m
-
3. Cracking WEP10m
-
4. Disassociation and Jamming7m
-
5. Man in the Middle, browser, and APR Poisoning19m
-
6. IV, RFID, NFC Attacks6m
-
7. MAC Flooding and Cloning6m
-
8. DDOS Attacks8m
-
9. Malicious Code4m
-
1. Actors and threats13m
-
2. Threat intelligence sources17m
-
3. Research sources11m
-
1. Cloud-based vs10m
-
2. Weak configurations9m
-
3. Third-party risks, Improper or weak patch, legacy platforms10m
-
4. Impacts6m
-
1. Threat hunting4m
-
2. Vulnerability scans18m
-
3. SIEM and SOAR13m
-
1. Penetration testing14m
-
2. Passive and active reconnaissance4m
-
3. Exercise types4m
-
1. Configuration management12m
-
2. Data Sovereignty and Protection12m
-
3. Other Security Consideration13m
-
4. Site Resiliency, Hot, Warm, Cold6m
-
5. Deception and disruption6m
-
1. IaaS11m
-
2. PaaS5m
-
3. SaaS, XaaS5m
-
4. Cloud Deployment2m
-
5. Cloud Application terms21m
-
6. IaC13m
-
7. Virtualization Issues5m
-
1. Software Development Environment3m
-
2. Secure Coding Techniques19m
-
3. DevOps and Automation9m
-
1. Authentication methods11m
-
2. Biometrics9m
-
3. MFA5m
-
4. Authentication, authorization, and accounting3m
-
1. Redundancy9m
-
2. Replication and storages9m
-
3. Backup Types14m
-
4. Non-persistence, high availability, diversity6m
-
5. RAID16m
-
1. Embedded Systems4m
-
2. Industrial control system4m
-
3. IoT4m
-
4. IoT Communication and considerations7m
-
1. Physical Security Controls9m
-
2. Other physical security controls7m
-
3. Locks and Fencings7m
-
4. Fire Suppression3m
-
5. Secure data destruction6m
-
1. Introduction to cryptography4m
-
2. Goals of cryptography6m
-
3. Algorithm and Keys20m
-
4. Block and stream ciphers4m
-
5. Symmetric Ciphers9m
-
6. Asymmetric Ciphers10m
-
7. Hashing13m
-
8. Hybrid cryptography9m
-
9. Digital signatures6m
-
10. Block Chain7m
-
11. Steganography8m
-
12. Key stretching2m
-
13. Salting6m
-
14. Quantum3m
-
15. Ephemeral, PFS, Homomorphic3m
-
16. Cipher Modes5m
-
17. Lightweight cryptography3m
-
18. Elliptic-curve cryptography3m
-
19. Cipher suites2m
-
20. Common use cases3m
-
21. Limitations of encryptions4m
-
1. DNSSEC4m
-
2. Email security with S/MIME and PMP5m
-
3. Installing Wireshark on Windows 108m
-
4. Install and setup an FTP Server and Client10m
-
5. Using Wireshark to capture an FTP Password and securing FTP Server9m
-
6. Lightweight Directory Access Protocol Over SSL5m
-
7. SRPT, FTPS, SFTP, SNMP, IMAP6m
-
8. SSH5m
-
9. VPN and IPSEC21m
-
10. Use Cases for secure protocols5m
-
1. Endpoint Protection5m
-
2. Boot integrity3m
-
3. Databases2m
-
4. Application Security10m
-
5. Hardening systems6m
-
6. Drive Encryption and sandboxing9m
-
1. Load Balancing7m
-
2. Network segmentation7m
-
3. How to download and install packet tracer9m
-
4. VLAN's and Port Security18m
-
5. Firewalls13m
-
6. Configuring firewall rules11m
-
7. Jump and Proxy servers4m
-
8. IDS and IPS9m
-
9. Other network secure concepts8m
-
1. Wireless Security17m
-
2. Wireless Installation Considerations5m
-
1. Mobile Connection methods and receivers3m
-
2. Mobile device management (MDM)5m
-
3. UEM and MAM4m
-
4. Enforcement and monitoring of mobile devices7m
-
5. Mobile Deployment Models4m
-
1. Cloud Solutions controls3m
-
2. Cloud Network and computing5m
-
3. Cloud Security terms7m
-
1. Identity and account types5m
-
2. Account policies12m
-
1. Authentication management4m
-
2. Authentication Protocols19m
-
3. Access control schemes14m
-
1. Introduction to PKI5m
-
2. Process of getting a certificate7m
-
3. PKI Setup16m
-
4. Fields on a certificate7m
-
5. Certificate formats2m
-
6. Certificate types6m
-
1. Introductions to commands2m
-
2. ARP and Route3m
-
3. hping6m
-
4. Curl4m
-
5. IP scanner3m
-
6. ipconfig, ping, tracert4m
-
7. Linux file manipulation, head, tail, cat5m
-
8. Log3m
-
9. Cuckoo1m
-
10. thehavester2m
-
11. Nslookup and Dig2m
-
12. tcpdump4m
-
13. NetCat2m
-
14. Sniper5m
-
15. scanless2m
-
16. nmap4m
-
17. Managing Linux Permissions16m
-
18. Shell and script environments2m
-
19. Exploitation frameworks4m
-
20. Forensics tools7m
-
1. Incident response process8m
-
2. Attack Frameworks5m
-
3. Incidents plans and exercises6m
-
1. Log Files7m
-
2. Capture log files7m
-
1. Incident mitigation techniques8m
-
1. Documentation and evidence6m
-
1. Control Types and category6m
-
1. Regulations, standards, and legislation5m
-
2. Key frameworks15m
-
3. Secure configuration guides2m
-
1. Personnel Controls15m
-
2. Third-party risk management6m
-
3. Credential and organizations policies7m
-
1. Risk types, terms, and Process12m
-
2. Risk management strategies6m
-
3. Risk Assessments9m
-
4. Business impact analysis8m
-
1. Privacy breaches4m
-
2. Data types6m
-
3. Privacy technologies and roles7m
-
1. Performance Based Questions Introduction1m
-
2. PBQ - Attack Types and Response2m
-
3. PBQ - Incident Response2m
-
4. PBQ - Social Engineering2m
-
5. PBQ - Firewalls4m
Hot Exams
VTSimu Exam Simulator
How to open .dumpsarena files
Use Free VTSimu Exam Simulator to open .dumpsarena files
Satisfaction Guaranteed
98.4% DumpsArena users pass
Our team is dedicated to delivering top-quality exam practice questions. We proudly offer a hassle-free satisfaction guarantee.
Why choose DumpsArena?
23,812+
Satisfied Customers Since 2018
- Always Up-to-Date
- Accurate and Verified
- Free Regular Updates
- 24/7 Customer Support
- Instant Access to Downloads
Secure Experience
Guaranteed safe checkout.
At DumpsArena, your shopping security is our priority. We utilize high-security SSL encryption, ensuring that every purchase is 100% secure.