SY0-601: CompTIA Security+ 2021
Best Seller
201 Lectures
23h 58m
Prepare for your CompTIA examination with our training course. The SY0-601 course contains a complete batch of videos that will provide you with profound and thorough knowledge related to CompTIA certification exam. Pass the CompTIA SY0-601 test with flying colors.
$14.99$24.99
Curriculum For This Course
- 1. SY0-501 vs 1m
- 2. Exam Information 6m
- 3. Building a lab 8m
- 1. CIA Triade 5m
- 2. IAAA 5m
- 3. Basic security controls 2m
- 1. Phishing, Smishing, Vishing, Spear phishing, Whaling 11m
- 2. Dumpster diving and Shoulder surfing 5m
- 3. Eliciting information and the principles of social engineering 9m
- 4. Pharming 7m
- 5. Spam 4m
- 6. Tailgating 3m
- 7. Other types Social Engineer techniques 15m
- 1. Introduction to Malware 2m
- 2. Ransomeware and Cryptomalware 7m
- 3. Trojans and RAT's 6m
- 4. Bot and Command and control 4m
- 5. Fileless Virus, Logic bombs, spyware, rootkit, backdoor 5m
- 6. Adversarial artificial intelligence (AI) 6m
- 7. Malicious USB cables, drives and Card Cloning 4m
- 8. Supply chain attacks 4m
- 9. Keyloggers 16m
- 10. How passwords are stored 5m
- 11. Using hashcat to crack passwords 7m
- 12. Using a brute force and rainbow tables to attack passwords 11m
- 1. Privilege escalation, (SSL) stripping, Pass the hash 11m
- 2. Cross-site scripting (XSS) and Injections 16m
- 3. Pointer Dereference, directory traversal, buffer overflows, and tocttou 12m
- 4. Replay attacks 4m
- 5. Request forgeries 9m
- 6. API Attacks 7m
- 7. Driver manipulation 5m
- 8. Integer overflow, Resource exhaustion, Memory leak 6m
- 1. Evil Twin and Rouge Access Point 6m
- 2. Bluesnarfing and Bluejacking 3m
- 3. Cracking WEP 10m
- 4. Disassociation and Jamming 7m
- 5. Man in the Middle, browser, and APR Poisoning 19m
- 6. IV, RFID, NFC Attacks 6m
- 7. MAC Flooding and Cloning 6m
- 8. DDOS Attacks 8m
- 9. Malicious Code 4m
- 1. Actors and threats 13m
- 2. Threat intelligence sources 17m
- 3. Research sources 11m
- 1. Cloud-based vs 10m
- 2. Weak configurations 9m
- 3. Third-party risks, Improper or weak patch, legacy platforms 10m
- 4. Impacts 6m
- 1. Threat hunting 4m
- 2. Vulnerability scans 18m
- 3. SIEM and SOAR 13m
- 1. Penetration testing 14m
- 2. Passive and active reconnaissance 4m
- 3. Exercise types 4m
- 1. Configuration management 12m
- 2. Data Sovereignty and Protection 12m
- 3. Other Security Consideration 13m
- 4. Site Resiliency, Hot, Warm, Cold 6m
- 5. Deception and disruption 6m
- 1. IaaS 11m
- 2. PaaS 5m
- 3. SaaS, XaaS 5m
- 4. Cloud Deployment 2m
- 5. Cloud Application terms 21m
- 6. IaC 13m
- 7. Virtualization Issues 5m
- 1. Software Development Environment 3m
- 2. Secure Coding Techniques 19m
- 3. DevOps and Automation 9m
- 1. Authentication methods 11m
- 2. Biometrics 9m
- 3. MFA 5m
- 4. Authentication, authorization, and accounting 3m
- 1. Redundancy 9m
- 2. Replication and storages 9m
- 3. Backup Types 14m
- 4. Non-persistence, high availability, diversity 6m
- 5. RAID 16m
- 1. Embedded Systems 4m
- 2. Industrial control system 4m
- 3. IoT 4m
- 4. IoT Communication and considerations 7m
- 1. Physical Security Controls 9m
- 2. Other physical security controls 7m
- 3. Locks and Fencings 7m
- 4. Fire Suppression 3m
- 5. Secure data destruction 6m
- 1. Introduction to cryptography 4m
- 2. Goals of cryptography 6m
- 3. Algorithm and Keys 20m
- 4. Block and stream ciphers 4m
- 5. Symmetric Ciphers 9m
- 6. Asymmetric Ciphers 10m
- 7. Hashing 13m
- 8. Hybrid cryptography 9m
- 9. Digital signatures 6m
- 10. Block Chain 7m
- 11. Steganography 8m
- 12. Key stretching 2m
- 13. Salting 6m
- 14. Quantum 3m
- 15. Ephemeral, PFS, Homomorphic 3m
- 16. Cipher Modes 5m
- 17. Lightweight cryptography 3m
- 18. Elliptic-curve cryptography 3m
- 19. Cipher suites 2m
- 20. Common use cases 3m
- 21. Limitations of encryptions 4m
- 1. DNSSEC 4m
- 2. Email security with S/MIME and PMP 5m
- 3. Installing Wireshark on Windows 10 8m
- 4. Install and setup an FTP Server and Client 10m
- 5. Using Wireshark to capture an FTP Password and securing FTP Server 9m
- 6. Lightweight Directory Access Protocol Over SSL 5m
- 7. SRPT, FTPS, SFTP, SNMP, IMAP 6m
- 8. SSH 5m
- 9. VPN and IPSEC 21m
- 10. Use Cases for secure protocols 5m
- 1. Endpoint Protection 5m
- 2. Boot integrity 3m
- 3. Databases 2m
- 4. Application Security 10m
- 5. Hardening systems 6m
- 6. Drive Encryption and sandboxing 9m
- 1. Load Balancing 7m
- 2. Network segmentation 7m
- 3. How to download and install packet tracer 9m
- 4. VLAN's and Port Security 18m
- 5. Firewalls 13m
- 6. Configuring firewall rules 11m
- 7. Jump and Proxy servers 4m
- 8. IDS and IPS 9m
- 9. Other network secure concepts 8m
- 1. Wireless Security 17m
- 2. Wireless Installation Considerations 5m
- 1. Mobile Connection methods and receivers 3m
- 2. Mobile device management (MDM) 5m
- 3. UEM and MAM 4m
- 4. Enforcement and monitoring of mobile devices 7m
- 5. Mobile Deployment Models 4m
- 1. Cloud Solutions controls 3m
- 2. Cloud Network and computing 5m
- 3. Cloud Security terms 7m
- 1. Identity and account types 5m
- 2. Account policies 12m
- 1. Authentication management 4m
- 2. Authentication Protocols 19m
- 3. Access control schemes 14m
- 1. Introduction to PKI 5m
- 2. Process of getting a certificate 7m
- 3. PKI Setup 16m
- 4. Fields on a certificate 7m
- 5. Certificate formats 2m
- 6. Certificate types 6m
- 1. Introductions to commands 2m
- 2. ARP and Route 3m
- 3. hping 6m
- 4. Curl 4m
- 5. IP scanner 3m
- 6. ipconfig, ping, tracert 4m
- 7. Linux file manipulation, head, tail, cat 5m
- 8. Log 3m
- 9. Cuckoo 1m
- 10. thehavester 2m
- 11. Nslookup and Dig 2m
- 12. tcpdump 4m
- 13. NetCat 2m
- 14. Sniper 5m
- 15. scanless 2m
- 16. nmap 4m
- 17. Managing Linux Permissions 16m
- 18. Shell and script environments 2m
- 19. Exploitation frameworks 4m
- 20. Forensics tools 7m
- 1. Incident response process 8m
- 2. Attack Frameworks 5m
- 3. Incidents plans and exercises 6m
- 1. Log Files 7m
- 2. Capture log files 7m
- 1. Incident mitigation techniques 8m
- 1. Documentation and evidence 6m
- 1. Control Types and category 6m
- 1. Regulations, standards, and legislation 5m
- 2. Key frameworks 15m
- 3. Secure configuration guides 2m
- 1. Personnel Controls 15m
- 2. Third-party risk management 6m
- 3. Credential and organizations policies 7m
- 1. Risk types, terms, and Process 12m
- 2. Risk management strategies 6m
- 3. Risk Assessments 9m
- 4. Business impact analysis 8m
- 1. Privacy breaches 4m
- 2. Data types 6m
- 3. Privacy technologies and roles 7m
- 1. Performance Based Questions Introduction 1m
- 2. PBQ - Attack Types and Response 2m
- 3. PBQ - Incident Response 2m
- 4. PBQ - Social Engineering 2m
- 5. PBQ - Firewalls 4m
Hot Exams
Microsoft AZ-204 Exam Dumps
Microsoft AZ-104 Exam Dumps
ISC2 CISSP Exam Dumps
Amazon AWS SAP-C02 Exam Dumps
Nutanix NCS-Core Exam Dumps
Nutanix NCP-MCI-6.5 Exam Dumps
Isaca CRISC Exam Dumps
Nokia 4A0-112 Exam Dumps
Nutanix NCM-MCI Exam Dumps
Linux Foundation CKS Exam Dumps
Isaca CDPSE Exam Dumps
IIA IIA-CIA-Part3-3P Exam Dumps
IAPP CIPM Exam Dumps
AAFM GLO_CWM_LVL_1 Exam Dumps
Microsoft AI-900 Exam Dumps
Microsoft DP-300 Exam Dumps
Microsoft MO-201 Exam Dumps
Cisco 350-501 Exam Dumps
Cisco 350-401 Exam Dumps
Cisco 300-515 Exam Dumps
CompTIA 220-1101 Exam Dumps
ISC2 CISSP Exam Dumps
CompTIA SY0-701 Exam Dumps
Microsoft AZ-104 Exam Dumps
Amazon AWS SAP-C02 Exam Dumps
Amazon Web Services SCS-C02 Exam Dumps
ITIL ITILFND-V4 Exam Dumps
PMI PMP Exam Dumps
Cisco 350-501 Exam Dumps
Microsoft AZ-204 Exam Dumps
Okta Okta-Certified-Professional Exam Dumps
Amazon AWS SAA-C03 Exam Dumps
Nutanix NCS-Core Exam Dumps
PEOPLECERT ITIL-4-DITS Exam Dumps
Nutanix NCP-MCI-6.5 Exam Dumps
Amazon Web Services CLF-C02 Exam Dumps
IIA IIA-CIA-Part2 Exam Dumps
Cisco 300-410 Exam Dumps
Cisco 350-401 Exam Dumps
Microsoft DP-300 Exam Dumps
How to Open Test Engine .dumpsarena Files
Use FREE DumpsArena Test Engine player to open .dumpsarena files
Refund Policy
DumpsArena.com has a remarkable success record. We're confident of our products and provide a no hassle refund policy.
Your purchase with DumpsArena.com is safe and fast.
The DumpsArena.com website is protected by 256-bit SSL from Cloudflare, the leader in online security.