SY0-601: CompTIA Security+ 2021

SY0-601: CompTIA Security+ 2021

BEST SELLER 201 Lectures 23h 58m

Prepare for your CompTIA examination with our training course. The SY0-601 course contains a complete batch of videos that will provide you with profound and thorough knowledge related to CompTIA certification exam. Pass the CompTIA SY0-601 test with flying colors.

$24.99 $32.49

Curriculum For This Course

3 lectures 15m
  • 1. SY0-501 vs
    1m
  • 2. Exam Information
    6m
  • 3. Building a lab
    8m

3 lectures 12m
  • 1. CIA Triade
    5m
  • 2. IAAA
    5m
  • 3. Basic security controls
    2m

7 lectures 54m
  • 1. Phishing, Smishing, Vishing, Spear phishing, Whaling
    11m
  • 2. Dumpster diving and Shoulder surfing
    5m
  • 3. Eliciting information and the principles of social engineering
    9m
  • 4. Pharming
    7m
  • 5. Spam
    4m
  • 6. Tailgating
    3m
  • 7. Other types Social Engineer techniques
    15m

12 lectures 1h 17m
  • 1. Introduction to Malware
    2m
  • 2. Ransomeware and Cryptomalware
    7m
  • 3. Trojans and RAT's
    6m
  • 4. Bot and Command and control
    4m
  • 5. Fileless Virus, Logic bombs, spyware, rootkit, backdoor
    5m
  • 6. Adversarial artificial intelligence (AI)
    6m
  • 7. Malicious USB cables, drives and Card Cloning
    4m
  • 8. Supply chain attacks
    4m
  • 9. Keyloggers
    16m
  • 10. How passwords are stored
    5m
  • 11. Using hashcat to crack passwords
    7m
  • 12. Using a brute force and rainbow tables to attack passwords
    11m

8 lectures 1h 10m
  • 1. Privilege escalation, (SSL) stripping, Pass the hash
    11m
  • 2. Cross-site scripting (XSS) and Injections
    16m
  • 3. Pointer Dereference, directory traversal, buffer overflows, and tocttou
    12m
  • 4. Replay attacks
    4m
  • 5. Request forgeries
    9m
  • 6. API Attacks
    7m
  • 7. Driver manipulation
    5m
  • 8. Integer overflow, Resource exhaustion, Memory leak
    6m

9 lectures 1h 9m
  • 1. Evil Twin and Rouge Access Point
    6m
  • 2. Bluesnarfing and Bluejacking
    3m
  • 3. Cracking WEP
    10m
  • 4. Disassociation and Jamming
    7m
  • 5. Man in the Middle, browser, and APR Poisoning
    19m
  • 6. IV, RFID, NFC Attacks
    6m
  • 7. MAC Flooding and Cloning
    6m
  • 8. DDOS Attacks
    8m
  • 9. Malicious Code
    4m

3 lectures 41m
  • 1. Actors and threats
    13m
  • 2. Threat intelligence sources
    17m
  • 3. Research sources
    11m

4 lectures 35m
  • 1. Cloud-based vs
    10m
  • 2. Weak configurations
    9m
  • 3. Third-party risks, Improper or weak patch, legacy platforms
    10m
  • 4. Impacts
    6m

3 lectures 35m
  • 1. Threat hunting
    4m
  • 2. Vulnerability scans
    18m
  • 3. SIEM and SOAR
    13m

3 lectures 22m
  • 1. Penetration testing
    14m
  • 2. Passive and active reconnaissance
    4m
  • 3. Exercise types
    4m

5 lectures 49m
  • 1. Configuration management
    12m
  • 2. Data Sovereignty and Protection
    12m
  • 3. Other Security Consideration
    13m
  • 4. Site Resiliency, Hot, Warm, Cold
    6m
  • 5. Deception and disruption
    6m

7 lectures 1h 2m
  • 1. IaaS
    11m
  • 2. PaaS
    5m
  • 3. SaaS, XaaS
    5m
  • 4. Cloud Deployment
    2m
  • 5. Cloud Application terms
    21m
  • 6. IaC
    13m
  • 7. Virtualization Issues
    5m

3 lectures 31m
  • 1. Software Development Environment
    3m
  • 2. Secure Coding Techniques
    19m
  • 3. DevOps and Automation
    9m

4 lectures 28m
  • 1. Authentication methods
    11m
  • 2. Biometrics
    9m
  • 3. MFA
    5m
  • 4. Authentication, authorization, and accounting
    3m

5 lectures 54m
  • 1. Redundancy
    9m
  • 2. Replication and storages
    9m
  • 3. Backup Types
    14m
  • 4. Non-persistence, high availability, diversity
    6m
  • 5. RAID
    16m

4 lectures 19m
  • 1. Embedded Systems
    4m
  • 2. Industrial control system
    4m
  • 3. IoT
    4m
  • 4. IoT Communication and considerations
    7m

5 lectures 32m
  • 1. Physical Security Controls
    9m
  • 2. Other physical security controls
    7m
  • 3. Locks and Fencings
    7m
  • 4. Fire Suppression
    3m
  • 5. Secure data destruction
    6m

21 lectures 2h 10m
  • 1. Introduction to cryptography
    4m
  • 2. Goals of cryptography
    6m
  • 3. Algorithm and Keys
    20m
  • 4. Block and stream ciphers
    4m
  • 5. Symmetric Ciphers
    9m
  • 6. Asymmetric Ciphers
    10m
  • 7. Hashing
    13m
  • 8. Hybrid cryptography
    9m
  • 9. Digital signatures
    6m
  • 10. Block Chain
    7m
  • 11. Steganography
    8m
  • 12. Key stretching
    2m
  • 13. Salting
    6m
  • 14. Quantum
    3m
  • 15. Ephemeral, PFS, Homomorphic
    3m
  • 16. Cipher Modes
    5m
  • 17. Lightweight cryptography
    3m
  • 18. Elliptic-curve cryptography
    3m
  • 19. Cipher suites
    2m
  • 20. Common use cases
    3m
  • 21. Limitations of encryptions
    4m

10 lectures 1h 18m
  • 1. DNSSEC
    4m
  • 2. Email security with S/MIME and PMP
    5m
  • 3. Installing Wireshark on Windows 10
    8m
  • 4. Install and setup an FTP Server and Client
    10m
  • 5. Using Wireshark to capture an FTP Password and securing FTP Server
    9m
  • 6. Lightweight Directory Access Protocol Over SSL
    5m
  • 7. SRPT, FTPS, SFTP, SNMP, IMAP
    6m
  • 8. SSH
    5m
  • 9. VPN and IPSEC
    21m
  • 10. Use Cases for secure protocols
    5m

6 lectures 35m
  • 1. Endpoint Protection
    5m
  • 2. Boot integrity
    3m
  • 3. Databases
    2m
  • 4. Application Security
    10m
  • 5. Hardening systems
    6m
  • 6. Drive Encryption and sandboxing
    9m

9 lectures 1h 26m
  • 1. Load Balancing
    7m
  • 2. Network segmentation
    7m
  • 3. How to download and install packet tracer
    9m
  • 4. VLAN's and Port Security
    18m
  • 5. Firewalls
    13m
  • 6. Configuring firewall rules
    11m
  • 7. Jump and Proxy servers
    4m
  • 8. IDS and IPS
    9m
  • 9. Other network secure concepts
    8m

2 lectures 22m
  • 1. Wireless Security
    17m
  • 2. Wireless Installation Considerations
    5m

5 lectures 23m
  • 1. Mobile Connection methods and receivers
    3m
  • 2. Mobile device management (MDM)
    5m
  • 3. UEM and MAM
    4m
  • 4. Enforcement and monitoring of mobile devices
    7m
  • 5. Mobile Deployment Models
    4m

3 lectures 15m
  • 1. Cloud Solutions controls
    3m
  • 2. Cloud Network and computing
    5m
  • 3. Cloud Security terms
    7m

2 lectures 17m
  • 1. Identity and account types
    5m
  • 2. Account policies
    12m

3 lectures 37m
  • 1. Authentication management
    4m
  • 2. Authentication Protocols
    19m
  • 3. Access control schemes
    14m

6 lectures 43m
  • 1. Introduction to PKI
    5m
  • 2. Process of getting a certificate
    7m
  • 3. PKI Setup
    16m
  • 4. Fields on a certificate
    7m
  • 5. Certificate formats
    2m
  • 6. Certificate types
    6m

20 lectures 1h 21m
  • 1. Introductions to commands
    2m
  • 2. ARP and Route
    3m
  • 3. hping
    6m
  • 4. Curl
    4m
  • 5. IP scanner
    3m
  • 6. ipconfig, ping, tracert
    4m
  • 7. Linux file manipulation, head, tail, cat
    5m
  • 8. Log
    3m
  • 9. Cuckoo
    1m
  • 10. thehavester
    2m
  • 11. Nslookup and Dig
    2m
  • 12. tcpdump
    4m
  • 13. NetCat
    2m
  • 14. Sniper
    5m
  • 15. scanless
    2m
  • 16. nmap
    4m
  • 17. Managing Linux Permissions
    16m
  • 18. Shell and script environments
    2m
  • 19. Exploitation frameworks
    4m
  • 20. Forensics tools
    7m

3 lectures 19m
  • 1. Incident response process
    8m
  • 2. Attack Frameworks
    5m
  • 3. Incidents plans and exercises
    6m

2 lectures 14m
  • 1. Log Files
    7m
  • 2. Capture log files
    7m

1 lectures 8m
  • 1. Incident mitigation techniques
    8m

1 lectures 6m
  • 1. Documentation and evidence
    6m

1 lectures 6m
  • 1. Control Types and category
    6m

3 lectures 22m
  • 1. Regulations, standards, and legislation
    5m
  • 2. Key frameworks
    15m
  • 3. Secure configuration guides
    2m

3 lectures 28m
  • 1. Personnel Controls
    15m
  • 2. Third-party risk management
    6m
  • 3. Credential and organizations policies
    7m

4 lectures 35m
  • 1. Risk types, terms, and Process
    12m
  • 2. Risk management strategies
    6m
  • 3. Risk Assessments
    9m
  • 4. Business impact analysis
    8m

3 lectures 17m
  • 1. Privacy breaches
    4m
  • 2. Data types
    6m
  • 3. Privacy technologies and roles
    7m

5 lectures 11m
  • 1. Performance Based Questions Introduction
    1m
  • 2. PBQ - Attack Types and Response
    2m
  • 3. PBQ - Incident Response
    2m
  • 4. PBQ - Social Engineering
    2m
  • 5. PBQ - Firewalls
    4m
VTSimu
VTSimu Exam Simulator
How to open .dumpsarena files

Use Free VTSimu Exam Simulator to open .dumpsarena files

VTSimu Exam Simulator

Satisfaction Guaranteed

98.4% DumpsArena users pass

Our team is dedicated to delivering top-quality exam practice questions. We proudly offer a hassle-free satisfaction guarantee.

Why choose DumpsArena?

23,812+

Satisfied Customers Since 2018

  • Always Up-to-Date
  • Accurate and Verified
  • Free Regular Updates
  • 24/7 Customer Support
  • Instant Access to Downloads
Secure Experience

Guaranteed safe checkout.

At DumpsArena, your shopping security is our priority. We utilize high-security SSL encryption, ensuring that every purchase is 100% secure.

SECURED CHECKOUT
Need Help?

Feel free to contact us anytime!

Contact Support