In this complete #compTIA #security+ course you will learn everything you need to know about IT / cyber security. Every topic of #IT #Security has been presented in a very comprehensive manner. Take this course to prepare yourself well to sit for the compTIA security+ exam.
**** Topics Discussed ****
Introduction to Network Devices (part 1) (
0:00)
Introduction to Network Devices (part 2) (
8:06)
Introduction to Network Devices (part 3) (15"50)
Secure Network Administration Concepts (
34:00)
Cloud Concepts (
41:00)
Secure Network Design Elements and Components (
48:00)
Common Network Protocols (part 1) (
55:20)
Common Network Protocols (part 2) (
1:01:00)
Common Network Protocols (part 3) (
1:08:00)
Wireless Security Considerations (
1:13:54)
Risk Related Concepts (part 1) (
1:23:12)
Risk Related Concepts (part 2) (
1:29:43)
Risk Related Concepts (part 3) (
1:36:08)
Integrating Data and Systems w Third Parties(
21:50)
Risk Mitigation Strategies (
1:41:27)
Basic Forensic Procedures (
1:46:17)
Incident Response Concepts (
1:54:15)
Security Related Awareness and Training (
1:59:38)
Physical Security and Enviornmental Controls (
2:08:03)
Disaster Recovery Concepts (
2:15:46)
Risk Management Best Practices (
2:23:30)
Goals of Security Controls (
2:30:54)
Types of Malware (
2:37:02)
A Summary of Types of Attacks (part 1) (
2:43:23)
A Summary of Types of Attacks (part 2) (
2:52:43)
A Summary of Social Engineering Attacks (
2:59:15)
A Summary of Wireless Attacks (
3:07:27)
Types of Application Attacks part 1
Types of Application Attacks part 2 (
3:10:51)
Security Enhancement Techniques (
3:15:33)
Overview of Security Assessment Tools (
3:22:21)
Vulnerability Scanning vs Pen Testing (
3:30:28)
Application Security Controls and Techniques (
3:37:10)
Mobile Security Concepts and Technologies (part 1) (
3:45:00)
Mobile Security Concepts and Technologies (part 2)(
3:52:00)
Solutions Used to Establish Host Security (
3:56:20)
Controls to Ensure Data Security (
4:04:00)
Mitigating Risks In Alternative Environments (
4:12:00)
Summary of Authentication Services (
4:21:20)
Authentication and Authorization Basics (part 1) (
4:28:00)
Authentication and Authorization Basics (part 2) (
4:35:00)
Security Controls for Account Management
Introduction to Cryptography (part 1) (
4:44:00)
Introduction to Cryptography (part 2) (
4:52:00)
Cryptographic Methods (part 1) (
5:00:00)
Cryptographic Methods (part 2)(
5:05:44)
Introduction to Public Key Infrastructure (part 1) (
5:13:00)
Introduction to Public Key Infrastructure (part 2) (
5:19:00)
*** Attribution ***
Course Created by: PaceIT Online
YouTube: https://www.youtube.com/channel/UCyTeMuUkzoB2Cl0AbRLtICg
License: Creative Commons Attribution license (reuse allowed)
*** Join our community ****
Join our FB Group: https://www.facebook.com/groups/cslesson
Like our FB Page: https://www.facebook.com/cslesson/
Website: https://cslesson.org