Exclusive SALE Offer Today

SY0-601: CompTIA Security+ 2021

Best Seller 201 Lectures 23h 58m
Prepare for your CompTIA examination with our training course. The SY0-601 course contains a complete batch of videos that will provide you with profound and thorough knowledge related to CompTIA certification exam. Pass the CompTIA SY0-601 test with flying colors.
$14.99$24.99
Curriculum For This Course

  • 1. CIA Triade 5m
  • 2. IAAA 5m
  • 3. Basic security controls 2m
  • 1. Phishing, Smishing, Vishing, Spear phishing, Whaling 11m
  • 2. Dumpster diving and Shoulder surfing 5m
  • 3. Eliciting information and the principles of social engineering 9m
  • 4. Pharming 7m
  • 5. Spam 4m
  • 6. Tailgating 3m
  • 7. Other types Social Engineer techniques 15m
  • 1. Introduction to Malware 2m
  • 2. Ransomeware and Cryptomalware 7m
  • 3. Trojans and RAT's 6m
  • 4. Bot and Command and control 4m
  • 5. Fileless Virus, Logic bombs, spyware, rootkit, backdoor 5m
  • 6. Adversarial artificial intelligence (AI) 6m
  • 7. Malicious USB cables, drives and Card Cloning 4m
  • 8. Supply chain attacks 4m
  • 9. Keyloggers 16m
  • 10. How passwords are stored 5m
  • 11. Using hashcat to crack passwords 7m
  • 12. Using a brute force and rainbow tables to attack passwords 11m
  • 1. Privilege escalation, (SSL) stripping, Pass the hash 11m
  • 2. Cross-site scripting (XSS) and Injections 16m
  • 3. Pointer Dereference, directory traversal, buffer overflows, and tocttou 12m
  • 4. Replay attacks 4m
  • 5. Request forgeries 9m
  • 6. API Attacks 7m
  • 7. Driver manipulation 5m
  • 8. Integer overflow, Resource exhaustion, Memory leak 6m
  • 1. Evil Twin and Rouge Access Point 6m
  • 2. Bluesnarfing and Bluejacking 3m
  • 3. Cracking WEP 10m
  • 4. Disassociation and Jamming 7m
  • 5. Man in the Middle, browser, and APR Poisoning 19m
  • 6. IV, RFID, NFC Attacks 6m
  • 7. MAC Flooding and Cloning 6m
  • 8. DDOS Attacks 8m
  • 9. Malicious Code 4m
  • 1. Actors and threats 13m
  • 2. Threat intelligence sources 17m
  • 3. Research sources 11m
  • 1. Cloud-based vs 10m
  • 2. Weak configurations 9m
  • 3. Third-party risks, Improper or weak patch, legacy platforms 10m
  • 4. Impacts 6m
  • 1. Threat hunting 4m
  • 2. Vulnerability scans 18m
  • 3. SIEM and SOAR 13m
  • 1. Penetration testing 14m
  • 2. Passive and active reconnaissance 4m
  • 3. Exercise types 4m
  • 1. Configuration management 12m
  • 2. Data Sovereignty and Protection 12m
  • 3. Other Security Consideration 13m
  • 4. Site Resiliency, Hot, Warm, Cold 6m
  • 5. Deception and disruption 6m
  • 1. IaaS 11m
  • 2. PaaS 5m
  • 3. SaaS, XaaS 5m
  • 4. Cloud Deployment 2m
  • 5. Cloud Application terms 21m
  • 6. IaC 13m
  • 7. Virtualization Issues 5m
  • 1. Software Development Environment 3m
  • 2. Secure Coding Techniques 19m
  • 3. DevOps and Automation 9m
  • 1. Authentication methods 11m
  • 2. Biometrics 9m
  • 3. MFA 5m
  • 4. Authentication, authorization, and accounting 3m
  • 1. Redundancy 9m
  • 2. Replication and storages 9m
  • 3. Backup Types 14m
  • 4. Non-persistence, high availability, diversity 6m
  • 5. RAID 16m
  • 1. Embedded Systems 4m
  • 2. Industrial control system 4m
  • 3. IoT 4m
  • 4. IoT Communication and considerations 7m
  • 1. Physical Security Controls 9m
  • 2. Other physical security controls 7m
  • 3. Locks and Fencings 7m
  • 4. Fire Suppression 3m
  • 5. Secure data destruction 6m
  • 1. Introduction to cryptography 4m
  • 2. Goals of cryptography 6m
  • 3. Algorithm and Keys 20m
  • 4. Block and stream ciphers 4m
  • 5. Symmetric Ciphers 9m
  • 6. Asymmetric Ciphers 10m
  • 7. Hashing 13m
  • 8. Hybrid cryptography 9m
  • 9. Digital signatures 6m
  • 10. Block Chain 7m
  • 11. Steganography 8m
  • 12. Key stretching 2m
  • 13. Salting 6m
  • 14. Quantum 3m
  • 15. Ephemeral, PFS, Homomorphic 3m
  • 16. Cipher Modes 5m
  • 17. Lightweight cryptography 3m
  • 18. Elliptic-curve cryptography 3m
  • 19. Cipher suites 2m
  • 20. Common use cases 3m
  • 21. Limitations of encryptions 4m
  • 1. DNSSEC 4m
  • 2. Email security with S/MIME and PMP 5m
  • 3. Installing Wireshark on Windows 10 8m
  • 4. Install and setup an FTP Server and Client 10m
  • 5. Using Wireshark to capture an FTP Password and securing FTP Server 9m
  • 6. Lightweight Directory Access Protocol Over SSL 5m
  • 7. SRPT, FTPS, SFTP, SNMP, IMAP 6m
  • 8. SSH 5m
  • 9. VPN and IPSEC 21m
  • 10. Use Cases for secure protocols 5m
  • 1. Endpoint Protection 5m
  • 2. Boot integrity 3m
  • 3. Databases 2m
  • 4. Application Security 10m
  • 5. Hardening systems 6m
  • 6. Drive Encryption and sandboxing 9m
  • 1. Load Balancing 7m
  • 2. Network segmentation 7m
  • 3. How to download and install packet tracer 9m
  • 4. VLAN's and Port Security 18m
  • 5. Firewalls 13m
  • 6. Configuring firewall rules 11m
  • 7. Jump and Proxy servers 4m
  • 8. IDS and IPS 9m
  • 9. Other network secure concepts 8m
  • 1. Wireless Security 17m
  • 2. Wireless Installation Considerations 5m
  • 1. Mobile Connection methods and receivers 3m
  • 2. Mobile device management (MDM) 5m
  • 3. UEM and MAM 4m
  • 4. Enforcement and monitoring of mobile devices 7m
  • 5. Mobile Deployment Models 4m
  • 1. Cloud Solutions controls 3m
  • 2. Cloud Network and computing 5m
  • 3. Cloud Security terms 7m
  • 1. Identity and account types 5m
  • 2. Account policies 12m
  • 1. Authentication management 4m
  • 2. Authentication Protocols 19m
  • 3. Access control schemes 14m
  • 1. Introduction to PKI 5m
  • 2. Process of getting a certificate 7m
  • 3. PKI Setup 16m
  • 4. Fields on a certificate 7m
  • 5. Certificate formats 2m
  • 6. Certificate types 6m
  • 1. Introductions to commands 2m
  • 2. ARP and Route 3m
  • 3. hping 6m
  • 4. Curl 4m
  • 5. IP scanner 3m
  • 6. ipconfig, ping, tracert 4m
  • 7. Linux file manipulation, head, tail, cat 5m
  • 8. Log 3m
  • 9. Cuckoo 1m
  • 10. thehavester 2m
  • 11. Nslookup and Dig 2m
  • 12. tcpdump 4m
  • 13. NetCat 2m
  • 14. Sniper 5m
  • 15. scanless 2m
  • 16. nmap 4m
  • 17. Managing Linux Permissions 16m
  • 18. Shell and script environments 2m
  • 19. Exploitation frameworks 4m
  • 20. Forensics tools 7m
  • 1. Incident response process 8m
  • 2. Attack Frameworks 5m
  • 3. Incidents plans and exercises 6m
  • 1. Log Files 7m
  • 2. Capture log files 7m
  • 1. Regulations, standards, and legislation 5m
  • 2. Key frameworks 15m
  • 3. Secure configuration guides 2m
  • 1. Personnel Controls 15m
  • 2. Third-party risk management 6m
  • 3. Credential and organizations policies 7m
  • 1. Risk types, terms, and Process 12m
  • 2. Risk management strategies 6m
  • 3. Risk Assessments 9m
  • 4. Business impact analysis 8m
  • 1. Privacy breaches 4m
  • 2. Data types 6m
  • 3. Privacy technologies and roles 7m
  • 1. Performance Based Questions Introduction 1m
  • 2. PBQ - Attack Types and Response 2m
  • 3. PBQ - Incident Response 2m
  • 4. PBQ - Social Engineering 2m
  • 5. PBQ - Firewalls 4m

How to Open Test Engine .dumpsarena Files

Use FREE DumpsArena Test Engine player to open .dumpsarena files

DumpsArena Test Engine

Windows

Refund Policy
Refund Policy

DumpsArena.com has a remarkable success record. We're confident of our products and provide a no hassle refund policy.

How our refund policy works?

safe checkout

Your purchase with DumpsArena.com is safe and fast.

The DumpsArena.com website is protected by 256-bit SSL from Cloudflare, the leader in online security.

Need Help Assistance?