Get $1 credit for every $25 spent!

The All-Access CompTIA A+ & Network Certification Prep Bundle

Ending In:
Add to Cart - $44.99
Add to Cart ($44.99)
$2,400
98% off
wishlist
Courses
12
Lessons
1,985
Enrolled
322

What's Included

Product Details

Access
Lifetime
Content
17.0 hours
Lessons
131

CompTIA A+ Certification Core 1 (220-1001)

Ace the Industry-Standard Certification for Security to Cloud, Data Management & More

By Total Seminars | in Online Courses

This is the first of a two-course series designed to prepare you to take and pass the CompTIA A+ Core 1 (220-1001) exam. CompTIA A+ is the industry standard for establishing a career in IT. Particularly CompTIA A+ 220-1001 covers mobile devices, networking technology, hardware, virtualization and cloud computing, and network troubleshooting. With 131 lectures, this video series will help you better understand these concepts and prepare you to pass the first part of the CompTIA A+ certification.

4.7/5 average rating: ★ ★ ★ ★

  • Access 131 lectures & 17 hours of content 24/7
  • Learn everything about monitors, CPUs, motherboards, hard drives, RAM, & more
  • Understand what the cloud is & how virtualization works
  • Build everything from a basic workstation to an awesome gaming system
  • Troubleshoot hardware & network issues

Total Seminars

Total Seminars provides certification training services and training materials to thousands of schools, corporations, and government agencies including the United Nations, the FBI and all branches of the Department of Defense. Total Seminars produces the #1 selling CompTIA A+ and Network+ Certification books with over 1 million books in print.

Total Seminars has created a number of “Best-Selling” Udemy video courses by Mike Meyers and the Total Seminars team of Instructors. They also develop supplemental materials such as the TotalTester certification practice tests and TotalSims lab simulations to support your certification preparation. These are available on the Total Seminars web site.

Important Details

  • Length of time users can access this course: lifetime
  • Access options: desktop & mobile
  • Redemption deadline: redeem your code within 30 days of purchase
  • Certification of completion included
  • Experience level required: intermediate
  • Have questions on how digital purchases work? Learn more here

Requirements

  • Basic familiarity with computers and networks

Course Outline

  • Your First Program
  • All About the CompTIA A+ Core 1 (220-1001) Exam
    • CompTIA A+ Core 1 (220-1001) Introduction - 2:04
    • What is the CompTIA A+? - 2:12
    • Why get CompTIA A+ Certified? - 2:52
    • What is on the CompTIA A+ Core 1 (220-1001) Exam? - 8:51
    • How to Pass the CompTIA A+ Exams - 4:14
    • How to Use this Video Course - 2:32
  • Book Chapter 1 - Safety and Professionalism
    • Tools of the Trade - 6:18
    • Troubleshooting Theory - 9:59
  • Book Chapter 2: The Visible Computer
    • Primary PC Components - 4:51
    • External Connections - 10:37
    • Inside the PC - 7:48
    • What is a Computer? - 6:55
  • Book Chapter 3 - CPUs
    • What is a CPU? - 15:04
    • CPU Speeds and Cores - 12:02
    • Caching - 7:13
    • CPU Sockets - 12:16
    • Installing a CPU - 11:03
    • Liquid Cooling - 3:58
  • Book Chapter 4 - RAM
    • RAM Technology - 10:36
    • RAM Capacity - 7:59
    • RAM Features - 7:23
    • Installing RAM - 7:24
  • Book Chapter 5 - Firmware
    • What is the BIOS? - 6:02
    • POST - 8:46
    • System Setup - 8:59
    • Troubleshooting Firmware - 11:53
  • Book Chapter 6 - Motherboards
    • Form Factors - 6:22
    • Chipsets - 4:51
    • Touring the Motherboard - 14:11
    • Touring the Case - 6:46
    • Installing a Motherboard - 9:16
  • Book Chapter 7 - Power Supplies
    • The Power Supply - 8:30
    • Mouting a Power Supply - 5:18
    • Choosing a Power Supply - 7:39
    • Cooling Your PC - 11:26
    • Troubleshooting Power Supplies - 9:19
    • Troubleshooting Core Components - 14:19
  • Book Chapter 8 - Mass Storage Technologies
    • Introduction to Mass Storage - 12:32
    • Magnetic Disk Drives - 8:28
    • Solid State Drives - 8:03
    • SCSI - 3:25
    • Boot Order - 6:56
  • Book Chapter 9 - Implementing Mass Storage
    • New Installation - First Drive - 5:23
    • RAID - 11:01
    • Hardware RAID - 7:01
    • Mass Storage Troubleshooting - 8:00
  • Book Chapter 10 - Essential Peripherals
    • Optical Media - 9:53
    • USB Standards - 10:11
    • Understanding USB - 10:47
    • Configuring USB - 7:16
    • Thunder and Lightning - 5:41
    • Keyboards and Mice - 7:57
    • Sight and Sound - 6:35
    • Readers and Scanners - 7:33
    • Using Expansion Cards - 7:55
  • Book Chapter 11 - Building a PC
    • The Right PC for the Job - 12:37
  • Book Chapter 17 - Display Technologies
    • Monitor Technologies - 7:51
    • LCD Breakdown - 4:14
    • Graphics Cards and Connections - 13:06
    • Installing a Graphics Card - 6:47
    • Projectors - 4:52
    • Troubleshooting Monitors - 5:42
  • Book Chapter 18 - Essentials of Networking
    • Introduction to Networking - 8:10
    • Hubs vs. Switches - 5:17
    • Hexadecimal - 7:07
    • WANs and Routers - 9:12
    • Cables and Connectors - 10:39
    • Crimping Cables - 10:03
    • Structured Cabling - 10:40
  • Book Chapter 19 - Local Area Networking
    • Introduction to TCP/IP - 14:22
    • Network IDs and Subnet Masks - 4:44
    • Special IP Addresses - 9:26
    • NAT - 7:23
    • Dynamic IP Addressing - 9:51
    • IPv6 - 7:03
    • Port Numbers - 11:52
    • TCP, UDP, and ICMP - 6:08
    • Understanding DNS - 8:48
    • Working with DNS - 7:26
    • Windows Naming - 7:40
    • Routers - 11:35
    • Basic Router Configuration - 12:02
    • Advanced Router Configuration - 6:15
    • VLANs - 7:22
    • Network Troubleshooting - 5:25
  • Book Chapter 20 - Wireless Networking
    • Wireless Network Hardware - 10:40
    • Wi-Fi Standards - 9:32
    • Basic WAP Setup - 11:09
    • Connecting to a Wi-Fi Network - 8:42
    • It's a Huge Mesh - 4:15
    • Beyond Wi-Fi - 6:56
    • Troubleshooting Wireless Connections - 6:59
  • Book Chapter 21 - The Internet
    • Beyond the LAN - 2:57
    • Internet Tiers - 5:58
    • Dial-up Connections - 8:18
    • Broadband Connections - 10:09
    • Firewalls and Servers - 6:15
    • FTP - 7:09
    • E-Mail - 7:42
    • Proxy Servers - 6:23
    • Virtual Private Networks (VPNs) - 7:59
    • Internet of Things (IoT) - 3:48
  • Book Chapter 22 - Virtualization
    • Understanding Virtualization - 10:14
    • Your First Virtual Machine - 11:27
    • Advanced Virtualization Setup - 10:20
    • Cloud Computing - 7:57
    • Cloud Ownership - 2:35
    • Cloud-Based Applications - 6:23
  • Book Chapter 23 - Portable Computing
    • Laptop Features - 8:09
    • Laptop Hardware Troubleshooting - The Tools - 4:54
    • Laptop Hardware - Core Hardware - 3:41
    • Laptop Hardware - CPU and Motherboard - 6:57
    • Touring Your Laptop Display - 4:08
  • Book Chapter 24 - Understanding Mobile Devices
    • What is a Mobile Device? - 8:48
    • Mobile Connections - 9:39
    • Touring Android - 10:13
    • Touring iOS - 7:39
    • Virtual Reality - 2:48
  • Book Chapter 25 - Care and Feeding of Mobile Devices
    • Maintaining Mobile Devices - 10:44
    • Mobile Devices and E-mail - 9:38
    • Mobile Synchronization - 7:41
  • Book Chapter 26 - Printers and Multifunction Devices
    • Laser Printers - 12:38
    • Inkjet Printers - 7:54
    • Impact Printers - 4:06
    • Thermal Printers - 3:36
    • Installing a Local Printer - 13:55
    • Sharing Printers - 8:27
    • Installing Wireless and Cloud Printers - 10:19
    • Troubleshooting Printers - 10:18
    • 3D Printing - 7:12
  • Book Chapter 27 - Securing Computers
    • Dealing with Threats - 7:24

View Full Curriculum


Access
Lifetime
Content
16.0 hours
Lessons
583

CompTIA Security+ SY0-501

Gain Basic Knowledge Needed to Plan, Implement & Maintain Information Security in a Vendor-Neutral Format

By Integrity Training | in Online Courses

The CompTIA Security+ is the premier vendor-neutral security certification. This preparatory course for the CompTIA Security+ certification exam assures that the students completely learn and understand the exam topics of the latest SY0-501 exam version. The students will be able to demonstrate their knowledge of security concepts, tools, and procedures. It also confirms their ability to react to security incidents and validates their skills in anticipating security risks and guarding against them.

  • Access 583 lectures & 16 hours of content 24/7
  • Gain basic knowledge needed to plan, implement & maintain information security in a vendor-neutral format
  • Understand different topics such as risk management, hots & network security, authentication and access control systems, & more
  • Course contents are based on the CompTIA Security+ (SY0-501) certification exam
  • Completely covers all the exam topics through theoretical & scenario-based learning examples
  • Completely learn & understand exam topics of the latest SY0-501 exam version
  • Demonstrate knowledge of security concepts, tools & procedures
Integrity Training, Certification Trainers for Over 20 Years
4.2/5 Instructor Rating: ★ ★ ★ ★

Integrity Training provides the corporate, government, and education sectors with proven on-demand training for employees. With 20 years in the business, over 600 online training courses, and over 1.2 million students taking the courses, Integrity Training is a name you can trust in workforce training.

Important Details

  • Length of time users can access this course: lifetime
  • Access options: desktop & mobile
  • Redemption deadline: redeem your code within 30 days of purchase
  • Certification of completion included
  • Experience level required: all levels
  • Have questions on how digital purchases work? Learn more here

Requirements

  • Any device with basic specification

Course Outline

  • Course Introduction
    • Course Introduction - 1:55
    • Courseware Information - 0:15
    • Instructor Introduction - 1:33
  • Chapter 01 - Identifying Security Fundamentals
    • Identifying Security Fundamentals - 1:11
    • Topic A: Identify Information Security Concepts - 0:53
    • Information Security - 1:18
    • Goals of Information Security - 1:56
    • Risk - 3:08
    • Vulnerabilities - 2:06
    • Threats - 0:58
    • Attacks - 1:16
    • Controls - 1:31
    • Types of Controls - 1:27
    • The Security Management Process - 1:45
    • Demo - Identifying Information Security Basics - 2:41
    • Topic B: Identify Basic Security Controls - 0:37
    • The CIA Triad - 0:28
    • The CIA Triad (cont.) - 5:09
    • Non-repudiation - 0:43
    • Identification - 1:05
    • Authentication - 0:47
    • Authentication Factors - 4:01
    • Authorization - 0:58
    • Access Control - 0:46
    • Accounting and Auditing - 1:02
    • Principle of Least Privilege - 1:58
    • Privilege Management - 3:02
    • Demo - Identifying Basic Security Controls - 1:58
    • Topic C: Identify Basic Authentication and Authorization Concepts - 0:49
    • Passwords - 2:04
    • Tokens - 1:27
    • Biometrics - 1:53
    • Geolocation - 1:26
    • Keystroke Authentication - 1:18
    • Multi-factor Authentication - 1:36
    • Mutual Authentication - 0:36
    • Demo - Identifying Basic Authentication and Authorization Concepts - 2:31
    • Topic D: Identify Basic Cryptography Concepts - 0:37
    • Cryptography - 1:34
    • Encryption and Decryption - 1:56
    • Encryption and Decryption (cont.) - 0:53
    • Encryption and Security Goals - 1:34
    • Ciphers - 1:20
    • A Key - 2:11
    • Symmetric Encryption - 0:55
    • Asymmetric Encryption - 1:45
    • Asymmetric Encryption ( cont.) - 1:56
    • Hashing - 1:54
    • Steganography - 1:46
    • Demo - Identifying Basic Cryptography Concepts - 4:43
    • Chapter 01 Review - 0:55
    • Review Questions
  • Chapter 02 - Analyzing Risk
    • Analyzing Risk - 1:06
    • Topic A: Analyze Organizational Risk - 0:37
    • Risk Management - 1:10
    • Components of Risk Analysis - 2:17
    • Phases of Risk Analysis - 2:41
    • Categories of Threat Types - 1:38
    • Risk Analysis Methods - 1:36
    • Risk Calculation - 3:10
    • Risk Response Techniques - 2:08
    • Risk Mitigation and Control Types - 2:20
    • Change Management - 2:00
    • Change Management (cont.) - 1:15
    • Guidelines for Analyzing Risk - 1:15
    • Demo - Analyzing Risks to the Organization - 3:03
    • Topic B: Analyze the Business Impact of Risk - 0:42
    • BIA - 1:14
    • Impact Scenarios - 1:17
    • Impact Scenarios (cont.1) - 0:40
    • Impact Scenarios (cont.2) - 1:43
    • Privacy Assessments - 2:06
    • Critical Systems and Functions - 1:04
    • Maximum Tolerable Downtime - 0:54
    • Recovery Point Objective - 1:01
    • Recovery Time Objective - 0:38
    • Mean Time to Failure - 0:34
    • Mean Time to Repair - 0:39
    • Mean Time Between Failures - 1:03
    • Guidelines for Performing a Business Impact Analysis - 0:55
    • Demo - Performing a Business Impact Analysis - 3:49
    • Chapter 02 Review - 0:51
    • Review Questions
  • Chapter 03 - Identifying Security Threats
    • Identifying Security Threats - 1:44
    • Topic A: Identify Types of Attackers - 0:29
    • Hackers and Attackers - 2:42
    • Hackers and Attackers (cont.) - 2:00
    • Threat Actors - 2:12
    • Threat actors (cont.) - 0:21
    • Threat Actor Attributes - 2:35
    • Threat Actor Attributes (cont.) - 1:18
    • Open-Source Intelligence - 1:35
    • Demo - Identifying Types of Attackers - 2:46
    • Topic B: Identify Social Engineering Attacks - 1:27
    • Social Engineering - 1:46
    • Social Engineering (cont.) - 1:56
    • Effectiveness - 5:49
    • Impersonation - 1:47
    • Phishing and Related Attacks - 4:12
    • Phishing and Related Attacks (cont.) - 2:40
    • Hoaxes - 1:14
    • Physical Exploits - 1:57
    • Watering Hole Attacks - 0:58
    • Demo - Identifying Social Engineering Attacks - 2:09
    • Topic C: Identify Malware - 0:30
    • Malicious Code - 0:53
    • Malicious Code (cont.) - 1:07
    • Viruses - 1:58
    • Worms - 0:59
    • Adware - 0:42
    • Spyware - 1:08
    • Trojan Horses - 1:02
    • Keyloggers - 1:22
    • Remote Access Trojans - 0:37
    • Logic Bombs - 1:20
    • Botnets - 2:28
    • Bonets (cont.) - 0:19
    • Ransomware - 3:19
    • Ransomware (cont.) - 0:56
    • Advance Persistent Threats - 1:04
    • Demo - Identifying Types of Malware - 2:44
    • Topic D: Identify Software-Based Threats - 0:37
    • Software Attacks - 0:45
    • Password Attacks - 0:52
    • Types of Password Attacks - 2:20
    • Types of Password Attacks (cont.) - 2:13
    • Cryptographic Attacks - 0:48
    • Types of Cryptographic Attacks - 2:36
    • Types of Cryptographic Attacks (cont.) - 1:21
    • Backdoor Attacks - 1:15
    • Backdoor Attaxks (cont.) - 0:18
    • Application Attacks - 1:08
    • Application Attacks (cont.) - 0:28
    • Types of Application Attacks - 4:29
    • Driver Manipulation - 1:23
    • Privilege Escalation - 1:21
    • Privilege Escalation (cont.) - 0:20
    • Demo - Identifying Password Attacks - 7:51
    • Topic E: Identify Network-Based Threats - 1:04
    • TCP/IP Basics - 3:06
    • TCP/IP (cont.) - 3:50
    • Spoofing Attacks - 0:52
    • IP and MAC Address Spoofing - 1:10
    • IP and MAC Address Spoofing (cont.) - 0:47
    • ARP Poisoning - 2:33
    • DNS Poisoning - 1:57
    • Port Scanning Attacks - 2:09
    • Port Scanning Attacks (cont.) - 0:13
    • Scan Types - 1:13
    • Scan Types (cont.) - 0:54
    • Eavesdropping Attacks - 1:21
    • Man-in-the-Middle Attacks - 0:44
    • Man-in-the-Middle Attacks (cont.) - 0:37
    • Man-in-the-Browser Attacks - 1:00
    • Replay Attacks - 0:37
    • Replay Attacks (cont.) - 0:34
    • DoS Attacks - 1:39
    • DDoS Attacks - 1:22
    • Hijacking Attacks - 1:24
    • Hijacking Attacks (cont.) - 1:29
    • Amplification Attacks - 0:35
    • Amplification Attacks (cont.) - 1:57
    • Pass the Hash Attacks - 1:08
    • Demo - Identifying Threats to DNS - 4:01
    • Demo - Identifying Port Scanning Threats - 7:26
    • Topic F: Identify Wireless Threats - 0:40
    • Rogue Access Points - 0:51
    • Evil Twins - 1:03
    • Jamming - 0:36
    • Bluejacking - 1:27
    • Bluesnarfing - 0:57
    • Near Field Communication Attacks - 1:03
    • RFID System Attacks - 0:58
    • War Driving, War Walking, and War Chalking - 1:11
    • Packet Sniffing - 0:44
    • IV Attacks - 1:16
    • Wireless Replay Attacks - 0:23
    • WEP and WPA Attacks - 2:38
    • WPS Attacks - 1:04
    • Wireless Disassociation - 0:57
    • Demo - Identifying Wireless Threats - 3:02
    • Topic G: Identify Physical Threats - 0:55
    • Physical Threats and Vulnerabilities - 0:50
    • Hardware Attacks - 0:44
    • Environmental Threats and Vulnerabilities - 2:01
    • Environmental Threats and Vulnerabilities (cont.) - 1:06
    • Demo - Identifying Physical Threats - 1:58
    • Chapter 03 Review - 1:16
    • Review Questions
  • Chapter 04 - Conducting Security Assessments
    • Conducting Security Assessments - 0:53
    • Topic A: Identify Vulnerabilities - 0:26
    • Host Vulnerabilities - 3:17
    • Software Vulnerabilities - 4:04
    • Encryption Vulnerabilities - 1:59
    • Network Architecture Vulnerabilities - 2:05
    • Account Vulnerabilities - 1:23
    • Operations Vulnerabilities - 3:06
    • Demo - Identifying Vulnerabilities - 2:57
    • Topic B: Assess Vulnerabilities - 0:24
    • Security Assessment - 1:56
    • Security Assessment Techniques - 2:43
    • Vulnerability Assessment Tools - 3:16
    • Types of Vulnerability Scans - 1:45
    • False Positives - 2:25
    • Guidelines for Assessing Vulnerabilities - 2:27
    • Demo - Capturing Network Data with Wireshark - 8:25
    • Demo - Scanning for General Vulnerabilities - 5:20
    • Topic C: Implement Penetration Testing - 0:28
    • Penetration Testing - 1:07
    • Penetration Testing Techniques - 3:05
    • Box Testing Methods - 1:28
    • Penetration Testing Tools - 0:58
    • Guidelines for Implementing Penetration Testing - 0:59
    • Demo - Implementing Penetration Testing - 4:50
    • Chapter 04 Review - 0:55
    • Review Questions
  • Chapter 05 - Implementing Host and Software Security
    • Implementing Host and Software Security - 1:04
    • Topic A: Implement Host Security - 0:23
    • Hardening - 1:58
    • Operating System Security - 1:41
    • Operating System Hardening Techniques - 1:34
    • Trusted Computing Base - 1:37
    • Hardware and Firmware Security - 2:01
    • Hardware and Firmware Security (cont.) - 1:18
    • Security Baselines - 0:57
    • Software Updates - 2:44
    • Application Blacklisting and Whitelisting - 1:32
    • Logging - 1:07
    • Auditing - 1:57
    • Anti-malware Software - 1:49
    • Types of Anti-malware Software - 2:42
    • Hardware Peripheral Security - 3:30
    • Embedded Systems - 1:29
    • Security Implications for Embedded Systems - 2:04
    • Security Implications for Embedded System (cont.) - 2:10
    • Guidelines for Securing Hosts - 1:47
    • Demo - Implementing Auditing - 4:41
    • Demo - Hardening a Server - 6:01
    • Topic B: Implement Cloud and Virtualization Security - 0:28
    • Virtualization - 2:50
    • Hypervisors - 1:35
    • Hypervisors (cont.) - 1:42
    • Virtual Desktop Infrastructure - 0:56
    • Virtualization Security - 2:42
    • Cloud Computing - 2:46
    • Cloud Deployment Models - 3:56
    • Cloud Service Types - 3:41
    • Guidelines for Securing Virtualized and Cloud-Based Resources - 1:22
    • Demo - Securing Virtual Machine Networking - 2:14
    • Topic C: Implement Mobile Device Security - 0:38
    • Mobile Device Connection Methods - 2:15
    • Mobile Device Connection Methods (cont.) - 1:52
    • Mobile Device Management - 0:42
    • Mobile Device Security Controls - 2:42
    • Mobile Device Security Controls (cont.) - 2:18
    • Mobile Device Monitoring and Enforcement - 3:08
    • Mobile Device Monitoring and Enforcement (cont.) - 2:44
    • Mobile Deployment Models - 3:10
    • BYOD Security Controls - 2:46
    • Guidelines for Implementing Mobile Device Security - 1:39
    • Demo - Implementing Mobile Device Security - 2:10
    • Topic D: Incorporate Security in the Software Development Lifecycle - 0:32
    • Software Development Lifecycle - 0:55
    • Software Development Models - 2:48
    • DevOps - 1:36
    • Versioning - 1:16
    • Secure Coding Techniques - 3:01
    • Secure Coding Techniques (cont.) - 1:42
    • Code Testing Methods - 1:35
    • Guidelines for Incorporating Security in the Software Development Lifecycle - 0:57
    • Demo - Performing Static Code Analysis - 4:30
    • Chapter 05 Review - 0:35
    • Review Questions
  • Chapter 06 - Implementing Network Security
    • Mobile Device Monitoring and Enforcement - 0:47
    • Topic A: Configure Network Security Technologies - 0:40
    • Network Components - 1:24
    • Network Devices - 0:29
    • Routers - 2:00
    • Switches - 2:42
    • Proxies - 2:28
    • Firewalls - 3:04
    • Load Balancer - 2:29
    • Network Scanners and Analysis Tools - 1:05
    • Intrusion Detection Systems - 0:45
    • Network IDS - 1:47
    • Intrusion Prevention Systems - 1:19
    • Network IPS - 0:47
    • Types of Network Monitoring Systems - 1:45
    • Security Information and Event Management - 1:08
    • Data Loss/Leak Prevention - 1:34
    • Virtual Private Networks - 1:14
    • VPN Concentrators - 1:06
    • Security Gateways - 1:16
    • Unified Threat Management - 1:18
    • Guidelines for Configuring Network Security Technologies - 1:56
    • Demo - Configuring a Network IDS - 7:53
    • Topic B: Secure Network Design Elements - 0:20
    • Network Access Control - 1:57
    • Demilitarized Zones - 0:59
    • Network Isolation - 1:46
    • Network Isolation (cont.) - 0:18
    • Virtual Local Area Networks - 1:12
    • Virtual Local Area Networks (cont.) - 0:28
    • Network Security Device Placement - 2:29
    • Network Address Translation - 1:09
    • Software-Defined Networking - 0:48
    • Guidelines for Securing Network Design Elements - 1:20
    • Demo - Securing Network Design Elements - 3:32
    • Topic C: Implement Secure Networking Protocols and Services - 0:26
    • The Open Systems Interconnection Model - 3:45
    • OSI Model and Security - 0:45
    • Internet Protocol Suite - 4:01
    • Domain Name System - 2:34
    • Hypertext Transfer Protocol - 0:55
    • Secure Sockets Layer/Transport Layer Security - 1:51
    • Secure Sockets Layer/Transport Layer Security (cont.) - 1:09
    • HTTP Secure - 0:28
    • Secure Shell - 0:58
    • Simple Network Management Protocol - 1:10
    • Real-Time Transport Protocol - 1:13
    • Internet Control Message Protocol - 1:23
    • Internet Protocol Security - 3:27
    • Network Basic Input/Output System - 1:05
    • File Transfer Protocols - 1:57
    • Email Protocols - 2:48
    • Additional Networking Protocols and Services - 1:36
    • Ports and Port Ranges - 1:37
    • Demo - Installing an Internet Information Services Web Server with Basic Security - 10:36
    • Demo - Securing Network Traffic Using IPSec - 6:00
    • Topic D: Secure Wireless Traffic - 0:18
    • Wireless Networks - 1:32
    • Wireless Antenna Types - 2:32
    • 802.11 Protocols - 3:04
    • Wireless Cryptographic Protocols - 2:17
    • Wireless Authentication Protocols - 2:34
    • VPNs and Open Wireless - 1:16
    • Wireless Client Authentication Methods - 1:46
    • Wireless Access Point Security - 2:05
    • Captive Portals - 0:42
    • Site Surveys - 0:52
    • Guidelines for Securing Wireless Traffic - 1:29
    • Demo - Securing Wireless Traffic - 6:12
    • Chapter 06 Review - 0:33
    • Review Questions
  • Chapter 07 - Managing Identity and Access
    • Managing Identify and Access - 0:58
    • Topic A: Implement Identity and Access Management - 0:26
    • Identity and Access Management - 2:10
    • Access Control Models - 4:47
    • Physical Access Control Devices - 1:08
    • Biometric Devices - 3:26
    • Certificate-Based Authentication - 1:45
    • File System and Database Access - 2:11
    • Guidelines for Implementing IAM - 1:29
    • Demo - Implementing DAC for a File Share - 6:17
    • Topic B: Configure Directory Services - 0:19
    • Directory Services - 1:16
    • Directory Services (cont.) - 0:44
    • Lightweight Directory Access Protocol - 1:48
    • Secure LDAP - 0:44
    • Common Directory Services - 2:17
    • Demo - Backing Up Active Directory - 8:15
    • Topic C: Configure Access Services - 0:24
    • Remote Access Methods - 1:19
    • Tunneling - 1:21
    • Remote Access Protocols - 2:09
    • HMAC-Based One-Time Password - 1:26
    • Time-Based OTP - 0:42
    • Password Authentication Protocol - 0:43
    • Challenge-Handshake Authentication Protocol - 2:34
    • NT LAN Manager - 1:19
    • Authentication, Authorization, and Accounting - 0:51
    • Remote Authentication Dial-In User Service - 0:55
    • Remote Authentication Dial-In User Service (cont.) - 1:00
    • Terminal Access Controller Access-Control System - 1:04
    • Kerberos - 1:19
    • Kerberos (Cont.) - 2:54
    • Demo - Configuring a Remote Access Server - 6:06
    • Demo - Setting Up Remote Access Authentication - 4:17
    • Topic D: Manage Accounts - 0:20
    • Account Management - 0:44
    • Account Privileges - 2:07
    • Account Types - 2:42
    • Account Policy - 1:55
    • Password Policy - 3:06
    • Multiple Accounts - 1:15
    • Shared Accounts - 1:43
    • Account Management Security Controls - 3:29
    • Credential Management - 1:05
    • Group Policy - 1:03
    • Identity Federation - 2:40
    • Identity Federation Methods - 2:07
    • Guidelines for Managing Accounts - 1:14
    • Demo - Managing Accounts - 5:13
    • Chapter 07 Review - 0:30
    • Review Questions
  • Chapter 08 - Implementing Cryptography
    • Implementing Crytography - 0:52
    • Topic A: Identify Advanced Cryptography Concepts - 0:21
    • Cryptography Elements - 3:01
    • Hashing Concepts - 1:33
    • Data States - 1:51
    • Key Exchange - 1:30
    • Key Exchange (cont.) - 0:17
    • Digital Signatures - 0:49
    • Digital Signatures (cont.) - 0:40
    • Cipher Suites - 1:35
    • Session Keys - 1:16
    • Key Stretching - 0:43
    • Special Considerations for Cryptography - 2:20
    • Demo - Identifying Advanced Cryptographic Concepts - 2:55
    • Topic B: Select Cryptographic Algorithms - 0:14
    • Types of Ciphers - 1:43
    • Types of Hashing Algorithms - 1:36
    • Types of Symmetric Encryption Algorithms - 2:25
    • Types of Asymmetric Encryption Techniques - 2:09
    • Types of Key Stretching Algorithms - 0:54
    • Substitution Ciphers - 1:14
    • Exclusive Or - 1:24
    • Cryptographic Modules - 1:14
    • Demo - Selecting Cryptographic Algorithms - 2:22
    • Topic C: Configure a Public Key Infrastructure - 0:32
    • Public Key Infrastructure - 0:59
    • PKI Components - 2:54
    • CA Hierarchies - 2:39
    • The Root CA - 0:39
    • Subordinate CAs - 0:44
    • Offline Root CAs - 0:43
    • Types of Certificates - 2:23
    • Types of Certificates (cont.) - 2:41
    • X.509 - 0:56
    • Certificate File Formats - 2:00
    • CA Hierarchy Design Options - 2:08
    • Demo - Installing a CA - 5:30
    • Demo - Securing a Windows Server 2016 CA - 7:39
    • Topic D: Enroll Certificates - 0:26
    • The Certificate Enrollment Process - 1:23
    • The Certificate Lifecycle - 1:22
    • Certificate Lifecycle Management - 1:46
    • The SSL/TLS Connection Process - 1:02
    • Demo - Enrolling Certificates - 4:32
    • Demo - Securing Network Traffic with Certificates - 2:26
    • Topic E: Back Up and Restore Certificates and Private Keys - 0:28
    • Private Key Protection Methods - 1:12
    • Key Escrow - 2:20
    • Private Key Restoration Methods - 2:01
    • Private Key Replacement - 0:38
    • Demo - Backing Up a Certificate and Private Key - 3:28
    • Demo - Restoring a Certificate and Private Key - 1:16
    • Topic F: Revoke Certificates - 0:17
    • Certificate Revocation - 1:04
    • Certificate Revocation List - 1:40
    • Certificate Revocation List (cont.) - 0:22
    • Online Certificate Status Protocol - 1:38
    • Demo - Revoking Certificates - 2:36
    • Chapter 08 Review - 1:03
    • Review Questions
  • Chapter 09 - Implementing Operational Security
    • Implementing Operational Security - 0:41
    • Topic A: Evaluate Security Frameworks and Guidelines - 0:21
    • Security Frameworks - 1:27
    • Security Framework Examples - 1:37
    • Security Configuration Guides - 1:37
    • Compliance - 1:30
    • Layered Security - 1:07
    • Defense in Depth - 0:46
    • Demo - Evaluating Security Frameworks and Guidelines - 2:53
    • Topic B: Incorporate Documentation in Operational Security - 0:19
    • Security Policies - 1:11
    • Security Policies (cont.) - 0:43
    • Common Security Policy Types - 2:57
    • Personnel Management - 0:51
    • Separation of Duties - 0:53
    • Job Rotation - 1:17
    • Mandatory Vacation - 0:54
    • Additional Personnel Management Tasks - 1:35
    • Training and Awareness - 2:01
    • Business Agreements - 1:43
    • Guidelines for Incorporating Documentation in Operational Security - 1:08
    • Demo - Incorporating Documentation in Operational Security - 3:48
    • Topic C: Implement Security Strategies - 0:26
    • Security Automation - 1:42
    • Scalability - 1:03
    • Elasticity - 1:17
    • Redundancy - 1:15
    • Fault Tolerance - 0:50
    • Redundant Array of Independent Disks - 1:33
    • Non-persistence - 1:27
    • High Availability - 1:08
    • Deployment Environments - 1:44
    • Guidelines for Implementing Security Strategies - 1:15
    • Demo - Implementing Virtual Machine Snapshots - 2:37
    • Topic D: Manage Data Security Processes - 0:24
    • Data Security - 0:53
    • Data Security Vulnerabilities - 0:51
    • Data Storage Methods - 1:14
    • Data Encryption Methods - 1:04
    • Data Sensitivity - 1:32
    • Data Management Roles - 1:28
    • Data Retention - 1:00
    • Data Disposal - 2:18
    • Guidelines for Managing Data Security - 0:54
    • Demo - Destroying Data Securely - 6:36
    • Demo - Encrypting a Storage Device - 3:48
    • Topic E: Implement Physical Controls - 0:26
    • Physical Security Controls - 1:20
    • Physical Security Control Types - 1:56
    • Physical Security Controls Types (cont. Part 1) - 1:38
    • Physical Security Controls Types (cont. Part 2) - 1:23
    • Physical Security Controls Types (cont. Part 3) - 0:46
    • Environmental Exposures - 0:36
    • Environmental Controls - 1:19
    • Environmental Controls (cont.) - 1:14
    • Environmental Monitoring - 0:37
    • Safety - 0:45
    • Guidelines for Implementing Physical Controls - 0:53
    • Demo - Implementing Physical Controls - 1:41
    • Chapter 09 Review - 0:31
    • Review Questions
  • Chapter 10 - Addressing Security Issues
    • Addressing Security Issues - 0:59
    • Topic A: Troubleshoot Common Security Issues - 0:24
    • Access Control Issues - 1:54
    • Encryption Issues - 1:21
    • Data Exfiltration - 1:08
    • Anomalies in Event Logs - 1:21
    • Security Configuration Issues - 2:11
    • Baseline Deviations - 1:14
    • Software Issues - 1:10
    • Personnel Issues - 1:53
    • Asset Management Issues - 1:06
    • Demo - Identifying Event Log Anomalies - 3:41
    • Topic B: Respond to Security Incidents - 0:14
    • Incident Response - 0:51
    • Incident Preparation - 1:00
    • Incident Detection and Analysis - 0:57
    • Incident Containment - 0:49
    • Incident Eradication - 0:32
    • Incident Recovery - 1:01
    • Lessons Learned - 0:43
    • Incident Response Plans - 1:31
    • First Responders - 0:31
    • An Incident Report - 0:42
    • Guidelines for Responding to Security Incidents - 0:33
    • Demo - Responding to a Security Incident - 2:39
    • Topic C: Investigate Security Incidents - 0:17
    • Computer Forensics - 0:42
    • The Basic Forensic Process - 1:34
    • Preservation of Forensic Data - 1:34
    • Basic Forensic Response Procedures - 1:29
    • Basic Forensic Response Procedure (cont.) - 1:03
    • Order of Volatility - 0:34
    • Chain of Custody - 0:24
    • Guidelines for Investigating Security Incidents - 0:53
    • Demo - Implementing Forensic Procedures - 5:39
    • Chapter 10 Review - 0:33
    • Review Questions
  • Chapter 11 - Ensuring Business Continuity
    • Ensuring Business Continuity - 0:43
    • Topic A: Select Business Continuity and Disaster Recovery Processes - 0:22
    • Business Continuity and Disaster Recovery - 1:55
    • The Disaster Recovery Process - 1:50
    • Recovery Team - 0:40
    • Order of Restoration - 1:46
    • Recovery Sites - 1:13
    • Secure Recovery - 0:34
    • Backup Types (Full) - 0:44
    • Backup Types (Differential vs. Incremental) - 1:37
    • Secure Backups - 1:21
    • Geographic Considerations - 1:27
    • Guidelines for Selecting Business Continuity and Disaster Recovery Processes - 1:28
    • Demo - Selecting Business Continuity and Disaster Recovery Processes - 2:14
    • Topic B: Develop a Business Continuity Plan - 0:16
    • Business Continuity Plans - 1:15
    • Business Continuity Plans (cont.) - 0:17
    • Disaster Recovery Plans - 1:00
    • Disaster Recovery Plans (cont.) - 0:25
    • IT Contingency Plans - 0:50
    • Succession Plans - 0:23
    • Failover - 1:08
    • Alternate Business Practices - 0:42
    • Testing Exercises - 1:05
    • After-Action Reports - 1:06
    • Guidelines for Developing a BCP - 0:58
    • Demo - Developing a BCP - 1:58
    • Chapter 11 Review - 0:26
    • Review Questions
    • Course Closure - 2:24

View Full Curriculum


Access
Lifetime
Content
12.0 hours
Lessons
266

CompTIA Advanced Security Practitioner (CAS-003)

Fight Back Against Today's Cyber Threats & Secure Enterprise Networks

By Integrity Training | in Online Courses

The CompTIA Advanced Security Practitioner course is a preparatory course for the exam CAS-003 conducted by The Computing Technology Industry Association (CompTIA). It covers the exam topics in detail and prepares the students in risk management, enterprise security operations and architecture, research and collaboration, and enterprise security integration. This certification course covers the technical knowledge and skills required to conceptualize, design, and engineer secure solutions across complex enterprise environments. It involves applying critical thinking and judgment across a broad spectrum of security disciplines to propose and implement solutions that map to enterprise drivers while managing risk.

  • Access 266 lectures & 12 hours of content 24/7
  • Be prepared in areas of risk management, enterprise security & architecture, research and collaborationk, & more
  • Acquire technical knowledge & skills required to conceptualize, design, and engineer solutions
  • Apply critical thinking & judgment across a broad spectrum of security disciplines
  • Propose & implement solutions that map enterprise drivers, while managing risks
Integrity Training, Certification Trainers for Over 20 Years
4.2/5 Instructor Rating: ★ ★ ★ ★

Integrity Training provides the corporate, government, and education sectors with proven on-demand training for employees. With 20 years in the business, over 600 online training courses, and over 1.2 million students taking the courses, Integrity Training is a name you can trust in workforce training.

Important Details

  • Length of time users can access this course: lifetime
  • Access options: desktop & mobile
  • Redemption deadline: redeem your code within 30 days of purchase
  • Certification of completion included
  • Experience level required: all levels
  • Have questions on how digital purchases work? Learn more here

Requirements

  • Minimum of 10 years of experience in IT administration with at least 5 years of hands-on technical security experience

Course Outline

  • Course Introduction
    • Course Introduction - 3:22
    • Instructor Introduction - 1:34
  • Chapter 01 - Understanding Risk Management
    • Chapter Introduction - 2:15
    • Topic A: Understanding Business and Industry Influences - 0:10
    • Ongoing Risk Management - 1:16
    • New Products and User Behaviors - 3:43
    • Business Models and Strategies - 3:25
    • Cloud Technologies - 4:47
    • Acquisitions and Mergers - 3:08
    • Due Diligence Team - 1:05
    • Data Ownership - 1:30
    • Data Reclassification - 1:00
    • Integrating Diverse Industries - 5:01
    • Common Regulations - 5:08
    • Geographic Differences - 2:25
    • Data Sovereignty - 0:53
    • Internal and External Influences - 5:32
    • De-perimeterization - 1:07
    • Understand Changes in Network Boundaries - 6:53
    • Topic B: Policies and Procedures - 0:22
    • Understanding Policies and Procedures - 1:34
    • Policy Life Cycle - 1:28
    • Process Life Cycle - 1:30
    • Reviewing Policies and Processes - 3:45
    • Common Business Documents - 4:44
    • Security for Contracts - 1:14
    • Contract Requirements - 1:54
    • General Privacy Principles - 1:13
    • Standard Security Practices - 11:28
    • Demo - Examining Security Policies - 7:11
    • Topic C: Risk Mitigation and Control - 0:24
    • Introduction to Risk Mitigation - 1:00
    • Categorizing Data - 3:48
    • Incorporating Stakeholder Input - 1:18
    • Aggregate CIA Scores - 1:36
    • Selecting and Implementing Controls - 4:11
    • Security Control Frameworks - 0:51
    • Options for Frameworks - 4:40
    • Extreme Scenario Planning - 2:41
    • System-Specific Risk Analysis - 1:13
    • Qualitative Risk Analysis - 1:39
    • Quantitative Risk Analysis - 1:05
    • Risk Impact - 3:08
    • Likelihood of Threat - 0:48
    • Return on Investment - 1:52
    • Understanding Payback - 2:05
    • Total Cost of Ownership - 1:24
    • TCO Guidelines - 1:23
    • Translate to Business Terms - 1:31
    • Risk Management Strategies - 2:09
    • Risk Management Processes - 1:06
    • Information and Asset Value and Costs - 0:49
    • Vulnerabilities and Threat Identification - 1:06
    • Additional Factors - 1:34
    • Topic D: Business Continuity Planning - 0:21
    • Continuity Planning - 0:19
    • BCP Components - 1:51
    • BCP Steps - 2:38
    • Additional Plans - 1:48
    • Conducting Business Impact Analysis - 4:57
    • Chapter 01 Review - 1:03
    • Quiz 1
  • Chapter 02 - Network and Security Components and Architecture
    • Chapter Introduction - 0:34
    • Topic A: Physical and Virtual Network Security Devices - 0:15
    • Unified Threat Management - 1:18
    • Analyzing UTM - 1:31
    • Intrusion Detection and Prevention - 5:13
    • In-Line Network Encryptor - 1:31
    • Network Access Control - 3:02
    • SIEM - 1:15
    • Firewalls - 7:05
    • Firewall Architecture - 5:16
    • Wireless Controller - 1:49
    • Routers and Switches - 2:09
    • Proxy Servers - 1:30
    • Topic B: Application and Protocol Level Security - 0:29
    • Web Application Firewalls - 1:46
    • Hardware Security Modules - 1:50
    • Vulnerability Scanners - 2:11
    • Topic C: Advanced Network Design - 0:31
    • Virtual Private Networks - 2:51
    • VPN Protocols - 1:58
    • IP Security (IPSec) - 3:01
    • IPSec Modes - 1:02
    • Demo - Examining IPSec Policies - 9:28
    • Secure Sockets Layer (SSL) - 1:44
    • Transport Layer Security (TLS) - 1:00
    • Additional Security Protocols - 3:25
    • Authentication Protocols - 4:45
    • Topic D: Network Solutions for Data Flow - 0:36
    • Data Loss Prevention ' - 2:48
    • Data Flow Enforcement - 2:00
    • Network Flow - 1:32
    • Topic E: Secure Baselines of Networking and Security Components - 0:30
    • Securing Device Configurations - 0:25
    • Access Control Lists (ACLs) - 0:42
    • ACL Rule Sets - 2:04
    • Change Monitoring - 1:30
    • Configuration Lockdown - 0:51
    • Availability Controls - 3:29
    • Disk Availability - 3:56
    • Key Availability Terms - 1:25
    • Topic F: Advanced Configuration of Network Devices - 0:16
    • Additional Configurations - 0:49
    • Transport Security - 1:44
    • Trunking Security - 3:47
    • Port Security - 2:20
    • Ports and Sockets - 3:37
    • Security Zones - 1:29
    • Network Segmentation - 1:24
    • Network Access Control - 2:52
    • NAC Concepts - 2:53
    • Network Enabled Devices - 2:20
    • Automation Systems - 1:23
    • Physical Security - 2:17
    • Chapter 02 Review - 1:16
    • Quiz 2
  • Chapter 03 - Implementing Advanced Authentication and Cryptographic Techniques
    • Chapter Introduction - 0:56
    • Topic A: Understanding Authentication and Authorization Concepts - 0:20
    • Authentication - 4:42
    • The Importance of Identity - 7:43
    • Additional Password Options - 0:54
    • Demo - Enforcing Strong Passwords - 10:04
    • Biometric Authentication - 2:50
    • Biometric Considerations - 1:35
    • Beyond Single Factor - 1:38
    • Certificate Authentication - 3:01
    • Authorization - 7:42
    • Open Authorization - 1:07
    • XACML - 1:55
    • SPML - 1:06
    • Authorization Concepts - 4:02
    • Trust Models - 1:53
    • Topic B: Cryptographic Techniques - 0:26
    • Introduction to Cryptography - 1:19
    • Cryptographic Techniques - 0:51
    • Key Stretching - 0:58
    • Hashing - 3:14
    • Message Digest (MD) Algorithms - 1:36
    • Secure Hash Algorithm (SHA) - 1:30
    • Digital Signatures - 2:00
    • Message Authentication - 1:17
    • Code Signing - 0:45
    • Additional Concepts - 2:12
    • Protecting Data in Transit - 2:01
    • Protecting Data in Memory - 1:13
    • Protecting Data at Rest - 3:44
    • Symmetric Algorithms - 4:08
    • Asymmetric Algorithms - 3:00
    • Encryption Methods - 3:22
    • Topic C: Cryptographic Implementations - 0:27
    • Crypto Options - 2:08
    • Additional Crypto Options - 2:41
    • Cryptographic Applications - 1:05
    • Crypto Considerations - 1:27
    • Stream vs. Block Ciphers - 1:47
    • Block Cipher Modes - 0:25
    • Public Key Infrastructure - 5:41
    • Primary PKI Functions - 2:09
    • Additional PKI Concepts - 1:42
    • Chapter 03 Review - 1:05
    • Quiz 3
  • Chapter 04 - Implementing Security for Systems, Applications, and Storage
    • Chapter Introduction - 0:56
    • Topic A: Security for Host Devices - 0:25
    • Trusted OS - 2:14
    • Trusted OS Options - 3:11
    • Security Software - 6:06
    • Additional Host-Based Software Options - 2:23
    • Demo - Configuring a Host-Based Firewall - 7:42
    • Auditing - 2:08
    • Demo - Configuring Audit Policies - 8:14
    • Endpoint Detection Response - 1:00
    • Host Hardening - 4:00
    • Group Policy - 2:20
    • Demo - Configuring Group Policy Security - 4:44
    • Command Shell Restrictions - 2:17
    • Out-of-Band Management - 2:11
    • Dedicated Interfaces - 2:34
    • External I/O Restrictions - 1:54
    • Wireless Technologies - 5:03
    • Wi-Fi Components - 1:59
    • 802.11 Standards - 3:21
    • Wireless Security - 5:39
    • Securing Other Host Devices - 3:18
    • Boot Security - 2:06
    • Additional Boot Security Options - 4:30
    • Topic B: Mobile Device Security - 0:40
    • Enterprise Mobility Management - 1:18
    • MDM Concepts - 2:56
    • Management Options - 3:32
    • Context Aware Management - 3:57
    • Security and Privacy - 4:16
    • Physical Security Options - 1:27
    • Additional Mobile Device Concepts - 6:07
    • Authentication Options - 2:22
    • Mobile Devices - 4:46
    • Wearable Security Implications - 1:38
    • Topic C: Software Security Controls - 0:26
    • Application Security Design Considerations - 3:03
    • Application Issues - 6:30
    • Application Issues (cont...) - 8:18
    • Data Remnants - 1:41
    • Securing Applications - 2:34
    • Using JSON and REST - 1:39
    • Browser Extensions - 2:39
    • Application Vulnerabilities - 1:57
    • Chapter 04 Review - 1:06
    • Quiz 4
  • Chapter 05 - Implementing Security for Cloud and Virtualization Technologies
    • Chapter Introduction - 2:21
    • Topic A: Cloud and Virtualization Technology - 1:21
    • Cloud Computing and Virtualization - 5:48
    • Cloud Options - 10:37
    • Security Considerations - 4:35
    • Cloud Service Models - 7:39
    • Demo - Examining Cloud Service Models - 9:14
    • Security and Virtualization - 5:46
    • Cloud-Augmented Security Services - 7:25
    • Security as a Service - 1:54
    • Virtualization Vulnerabilities - 3:40
    • Topic B: Securing Remote Access and Collaboration - 0:37
    • Remote Access - 1:09
    • Dial-Up Access - 3:09
    • Virtual Private Networks - 1:49
    • Remote Access Purposes - 3:05
    • Security Considerations - 2:08
    • Unified Collaboration Tools - 1:08
    • Web Conferencing - 4:43
    • Video Conferencing - 3:06
    • Storage and Document Collaboration - 3:12
    • Unified Communication - 1:44
    • Instant Messaging - 3:01
    • Presence - 3:13
    • E-Mail - 11:55
    • Chapter 05 Review - 1:04
    • Quiz 5
  • Chapter 06 - Utilizing Security Assessments and Incident Response
    • Chapter Introduction - 1:09
    • Topic A: Security Assessments - 0:20
    • Importance of Security Assessments - 0:40
    • Malware Sandboxing - 2:29
    • Memory Dumping - 1:36
    • Runtime Debugging - 1:25
    • Reconnaissance - 1:19
    • Fingerprinting - 2:29
    • Code Review - 2:47
    • Social Engineering - 12:47
    • Public Information - 11:15
    • Demo - Accessing Public Information - 6:36
    • Penetration Test - 5:41
    • Vulnerability Assessment - 3:34
    • Assessment Styles - 4:30
    • Topic B: Security Assessment Tools - 0:34
    • Network Tool Types - 4:39
    • Security Content Automation Protocol (SCAP) - 2:03
    • Common Vulnerability Scoring System (CVSS) - 3:16
    • Fuzzing - 0:50
    • Exploit Kits - 1:06
    • Host Tools - 7:25
    • Additional Host Tools - 3:40
    • Physical Security Tools - 3:23
    • Topic C: Incident Response and Recovery - 1:02
    • E-discovery - 5:37
    • Data Breach - 1:23
    • Incident Response Process - 4:30
    • Chapter 06 Review - 0:56
    • Quiz 6
    • Course Closure - 2:36

View Full Curriculum


Access
Lifetime
Content
8.0 hours
Lessons
30

CompTIA Security+ SY0-601

Recommend & Implement Appropriate Security Solutions in an Enterprise Environment

By eCourses4you | in Online Courses

The CompTIA Security+ is the first security certification IT professionals should earn. It establishes the core knowledge required of any cybersecurity role and provides a springboard to intermediate-level cybersecurity jobs. Security+ incorporates best practices in hands-on troubleshooting to ensure security professionals have practical security problem-solving skills. Cybersecurity professionals with Security+ know how to address security incidents – not just identify them.

  • Access 30 lectures & 8 hours of content 24/7
  • Assess the cybersecurity posture of an enterprise environment
  • Recommend & implement appropriate cybersecurity solutions
  • Monitor & secure hybrid environments
  • Operate with an awareness of applicable laws & policies
  • Identify, analyze & respond to cybersecurity events and incidents
  • Utilize appropriate data sources to support an investigation
  • Use mitigation techniques or controls to secure an environment
  • Compare various types of controls

e-Courses4You

e-Courses4you was created to bring talented, certified, businesses and instructors from all over the world to share and impart their knowledge with you, their valued student. Once a course is taken with e-Courses4you, their instructors are on standby to answer any questions you may have about the training. They also stay in touch with you, motivate, encourage and advise you so that you finish your training in good time. They understand that their students take their courses to achieve an outcome, be it to climb a career ladder, start a new business or achieve optimal health, well, their dedicated team of professionals are here to help you achieve that goal, every step of the way.

Important Details

  • Length of time users can access this course: lifetime
  • Access options: desktop & mobile
  • Redemption deadline: redeem your code within 30 days of purchase
  • Certification of completion included
  • Experience level required: all levels
  • Have questions on how digital purchases work? Learn more here

Requirements

  • Minimum of 2 years of experience in IT systems administration with a focus on security and hands-on technical information security experience CompTIA Network+ certification is recommended

Course Outline

  • Module 1 - Attacks Threats and Vulnerabilities
    • 1.1 - Attacks Treats and Vulnerabilities - 16:31
    • 1.2 - Malware - 17:21
    • 1.3 - Application Attacks - 12:36
    • 1.4 - Network Attacks - 10:15
  • Module 2 - Architecture and Design
    • 2.1 - Enterprise Security - 31:06
    • 2.2 - Virtualisation and Cloud - 20:06
    • 2.3 - Secure Developement and Deployment - 25:38
    • 2.4 - Authentication and Authorisation Design - 17:29
    • 2.5 - Cybersecurity Resilliance - 16:01
    • 2.6 - Physical Security Controls - 13:16
    • 2.7 - Cryptographic Concepts - 15:52
  • Module 3 - Implementation
    • 3.1 - Secure Protocols - 19:13
    • 3.2 - Host and Application Security - 29:28
    • 3.3 - Secure Network Design - 23:53
    • 3.4 - Wireless Security - 17:49
    • 3.5 - Secure Mobile Solutions - 17:58
    • 3.6 - Cloud Cybersecurity Solutions - 10:08
    • 3.7 - Identity Management Controls - 9:28
    • 3.8 - Authentication and Authorisation - 33:36
    • 3.9 - Public Key Infrastructure - 23:32
  • Module 4 - Operations and Incident Response
    • 4.1 - Organisational Security - 23:14
    • 4.2 - Incident Response - 12:57
    • 4.3 - Incident Investigation - 10:48
    • 4.4 - Incident Mitigation - 18:36
    • 4.5 - Digital Forensics - 14:44
  • Module 5 - Governance Risk and Compliance
    • 5.1 - Control Types - 6:07
    • 5.2 - Regulations Standards and Frameworks - 9:53
    • 5.3 - Organisational Security Policies - 10:06
    • 5.4 - Risk Management - 17:56
    • 5.5 - Sensitive Data and Privacy - 8:35

View Full Curriculum


Access
Lifetime
Content
23.0 hours
Lessons
175

TOTAL: CompTIA Network+ Certification (N10-007)

Address the Current and Changing Network Technologies as a CompTI Network+ Professional

By Total Seminars | in Online Courses

The CompTIA Network+ Certification is a trusted mid-level certification for network technicians. Network+ professionals possess well-grounded knowledge and skills in troubleshooting, configuring, and managing networks. With 22 hours of instruction lead by the industry's leading authority on CompTIA Certifications, this course aims to make you a good Network Tech and, in the process, make sure you are ready to pass the CompTIA exam.

4.7/5 average rating: ★ ★ ★ ★

  • Access 175 lectures & 23 hours of content 24/7
  • Design & implement functional networks
  • Understand & execute network security, standards, and protocols
  • Troubleshoot basic to advanced network problems
Total Seminars
4.7/5 Instructor Rating: ★ ★ ★ ★

Total Seminars provides certification training services and training materials to thousands of schools, corporations, and government agencies including the United Nations, the FBI and all branches of the Department of Defense. Total Seminars produces the #1 selling CompTIA A+ and Network+ Certification books with over 1 million books in print.

Total Seminars has created a number of “Best-Selling” Udemy video courses by Mike Meyers and the Total Seminars team of Instructors. They also develop supplemental materials such as the TotalTester certification practice tests and TotalSims lab simulations to support your certification preparation. These are available on the Total Seminars web site.

Important Details

  • Length of time users can access this course: lifetime
  • Access options: desktop & mobile
  • Redemption deadline: redeem your code within 30 days of purchase
  • Certification of completion included
  • Experience level required: intermediate
  • Have questions on how digital purchases work? Learn more here

Requirements

  • Basic familiarity with computers and networks

Course Outline

  • Introduction
    • Introduction to CompTIA Network+ (N10-007) - 3:14
  • Chapter 1 - Network Models
    • 01 - What is a Model? - 2:07
    • 02 - OSI Model vs. TCP/IP Model - 7:02
    • 03 - Walking Through OSI and TCP/IP - 12:08
    • 04 - Meet the Frame - 5:52
    • 05 - The MAC Address - 7:22
    • 06 - Broadcast vs. Unicast - 4:19
    • 07 - Introduction to IP Addressing - 7:41
    • 08 - Packets and Ports - 4:57
    • Network Models Quiz
  • Chapter 2 - Cabling and Topology
    • 01 - Network Topologies - 10:14
    • 02 - Coaxial Cabling - 5:23
    • 03 - Twisted Pair Cabling - 6:24
    • 04 - Cat Ratings - 6:05
    • 05 - Fiber Optic Cabling - 8:41
    • 06 - Fire Ratings - 5:21
    • 07 - Legacy Network Connections - 7:04
    • Cabling and Topology Quiz
  • Chapter 3 - Ethernet Basics
    • 01 - What is Ethernet? - 6:31
    • 02 - Ethernet Frames - 6:43
    • 03 - Early Ethernet - 7:40
    • 04 - The Daddy of Ethernet: 10BaseT - 3:23
    • 05 - Terminating Twisted Pair - 14:25
    • 06 - Hubs vs. Switches - 12:38
    • Ethernet Basics Quiz
  • Chapter 4 - Modern Ethernet
    • 01 - 100BaseT - 5:24
    • 02 - Connecting Switches - 5:15
    • 03 - Gigabit Ethernet and 10-Gigabit Ethernet - 5:19
    • 04 - Transceivers - 7:10
    • 05 - Connecting Ethernet Scenarios - 13:57
  • Chapter 5 - Installing a Physical Network
    • 01 - Introduction to Structured Cabling - 4:16
    • 02 - Terminating Structured Cabling - 7:54
    • 03 - Equipment Room - 7:18
    • 04 - Alternative Distribution Panels - 3:49
    • 05 - Testing Cable - 8:52
    • 06 - Troubleshooting Structured Cabling, Part 1 - 5:05
    • 07 - Troubleshooting Structured Cabling, Part 2 - 5:27
    • 08 - Using a Toner and Probe - 2:45
    • 09 - Wired Connection Scenarios - 10:30
  • Chapter 6 - TCP/IP Basics
    • 01 - Introduction to IP Addressing and Binary - 12:42
    • 02 - Introduction to ARP - 3:45
    • 03 - Subnet Masks - 12:11
    • 04 - Classful Addressing - 10:23
    • 05 - Subnetting with CIDR - 9:48
    • 06 - More CIDR Subnetting Practice - 10:01
    • 07 - Dynamic and Static IP Addressing - 17:44
    • 08 - Rogue DHCP Servers - 6:29
    • 09 - Special IP Addresses - 7:01
    • 10 - IP Addressing Scenarios - 14:46
  • Chapter 7 - Routing
    • 01 - Introducing Routers - 15:18
    • 02 - Understanding Ports - 5:25
    • 03 - Network Address Translation - 6:24
    • 04 - Implementing NAT - 2:36
    • 05 - Forwarding Ports - 17:38
    • 06 - Tour of a SOHO Router - 12:01
    • 07 - SOHO vs. Enterprise - 8:41
    • 08 - Static Routes - 12:39
    • 09 - Dynamic Routing - 10:35
    • 10 - RIP - 4:26
    • 11 - OSPF - 3:33
    • 12 - BGP - 5:39
  • Chapter 8 - TCP/IP Applications
    • 01 - TCP and UDP - 7:22
    • 02 - ICMP and IGMP - 6:08
    • 03 - Handy Tools - 6:43
    • 04 - Introduction to Wireshark - 10:37
    • 05 - Introduction to netstat - 8:49
    • 06 - Web Servers - 11:52
    • 07 - FTP - 11:48
    • 08 - E-mail Servers and Clients - 9:27
    • 09 - Securing E-mail - 5:47
    • 10 - Telnet and SSH - 9:16
    • 11 - Network Time Protocol - 1:59
    • 12 - Network Service Scenarios - 9:33
  • Chapter 9 - Network Naming
    • 01 - Understanding DNS - 12:10
    • 02 - Applying DNS - 18:56
    • 03 - The HOSTS File - 3:45
    • 04 - Net Command - 8:12
    • 05 - Windows Name Resolution - 11:22
    • 06 - Dynamic DNS - 5:25
    • 07 - DNS Troubleshooting - 13:13
  • Chapter 10 - Securing TCP/IP
    • 01 - Making TCP/IP Secure - 4:25
    • 02 - Symmetric Encryption - 5:32
    • 03 - Asymmetric Encryption - 3:19
    • 04 - Cryptographic Hashes - 4:56
    • 05 - Identification - 12:11
    • 06 - Access Control - 4:20
    • 07 - AAA - 4:59
    • 08 - Kerberos/EAP - 7:33
    • 09 - Single Sign-On - 10:09
    • 10 - Certificates and Trust - 13:51
    • 11 - Certificate Error Scenarios - 8:06
  • Chapter 11 - Advanced Networking Devices
    • 01 - Understanding IP Tunneling - 6:04
    • 02 - Virtual Private Networks (VPNs) - 12:44
    • 03 - Introduction to VLANs - 11:52
    • 04 - InterVLAN Routing - 3:09
    • 05 - Interfacing with Managed Switches - 11:02
    • 06 - Switch Port Protection - 6:41
    • 07 - Port Bonding - 7:15
    • 08 - Port Mirroring - 3:32
    • 09 - Quality of Service - 5:10
    • 10 - IDS vs. IPS - 4:28
    • 11 - Proxy Servers - 12:44
    • 12 - Load Balancing - 8:32
    • 13 - Device Placement Scenarios - 12:59
  • Chapter 12 - IPv6
    • 01 - Intro to IPv6 - 12:52
    • 02 - IPv6 Addressing - 15:09
    • 03 - IPv6 in Action - 13:13
    • 04 - IPv4 and IPv6 Tunneling - 5:20
  • Chapter 13 - Remote Connectivity
    • 01 - Telephony Technologies - 8:59
    • 02 - Optical Carriers - 3:08
    • 03 - Packet Switching - 4:56
    • 04 - Connecting with Dial-up - 4:53
    • 05 - Digital Subscriber Line (DSL) - 4:32
    • 06 - Connecting with Cable Modems - 4:16
    • 07 - Connecting with Satellites - 2:30
    • 08 - ISDN and BPL - 4:01
    • 09 - Remote Desktop Connectivity - 4:49
    • 10 - Advanced Remote Control Systems - 8:42
  • Chapter 14 - Wireless Networking
    • 01 - Introduction to 802.11 - 11:38
    • 02 - 802.11 Standards - 12:17
    • 03 - Power Over Ethernet (PoE) - 3:43
    • 04 - Antennas - 8:38
    • 05 - Wireless Security Standards - 15:46
    • 06 - Implementing Wireless Security - 6:56
    • 07 - Threats to Your Wireless Network - 7:01
    • 08 - Retro Threats - 5:05
    • 09 - Wi-Fi Protected Setup (WPS) - 5:21
    • 10 - Enterprise Wireless - 6:07
    • 11 - Installing a Wireless Network - 14:44
    • 12 - Wireless Scenarios - 7:02
    • 13 - More Wireless Scenarios - 8:50
  • Chapter 15 - Virtualization and Cloud Computing
    • 01 - Virtualization Basics - 7:15
    • 02 - Cloud Ownership - 2:41
    • 03 - Cloud Implementation - 11:36
    • 04 - Your First Virtual Machine - 9:15
    • 05 - NAS and SAN - 16:23
    • 06 - Platform as a Service (PaaS) - 8:54
    • 07 - Software as a Service (SaaS) - 2:39
    • 08 - Infrastructure as a Service (IaaS) - 9:32
  • Chapter 16 - Mobile Networking
    • 01 - Cellular Technologies - 5:13
    • 02 - Mobile Connectivity - 7:12
    • 03 - Deploying Mobile Devices - 5:16
    • 04 - Mobile Access Control - 6:26
  • Chapter 17 - Building a Real-World Network
    • 01 - Network Types - 4:08
    • 02 - Network Design - 9:46
    • 03 - Power Management - 5:59
    • 04 - Unified Communications - 11:09
    • 05 - Network Documentation - 6:31
    • 06 - Contingency Planning - 10:10
    • 07 - Predicting Hardware Failure - 4:31
    • 08 - Backups - 7:43
  • Chapter 18 - Managing Risk
    • 01 - What is Risk Management? - 6:02
    • 02 - Security Policies - 8:28
    • 03 - Change Management - 6:41
    • 04 - User Training - 2:56
    • 05 - Standard Business Documentation - 5:08
    • 06 - Mitigating Network Threats - 4:53
    • 07 - High Availablity - 4:39
  • Chapter 19 - Protecting Your Network
    • 01 - Denial of Service - 8:33
    • 02 - Malware - 10:11
    • 03 - Social Engineering - 3:55
    • 04 - Access Control - 8:05
    • 05 - Man-in-the-Middle - 22:07
    • 06 - Introduction to Firewalls - 4:30
    • 07 - Firewalls - 10:12
    • 08 - DMZ - 5:30
    • 09 - Hardening Devices - 13:49
    • 10 - Physical Security Controls - 8:44
    • 11 - Testing Network Security - 7:57
    • 12 - Network Protection Scenarios - 14:18
  • Chapter 20 - Network Monitoring
    • 01 - SNMP - 15:08
    • 02 - Documenting Logs - 9:15
    • 03 - System Monitoring - 8:01
    • 04 - SIEM - 7:06
  • Chapter 21 - Network Troubleshooting
    • 01 - Network Troubleshooting Theory - 5:12

View Full Curriculum


Access
Lifetime
Content
7.0 hours
Lessons
51

CompTIA CySA+ Cybersecurity Analyst (CS0-001)

Ace the High-Stakes Security Analyst Certification & Be a Well-Respected Professional in the Cybersecurity Field

By Total Seminars | in Online Courses

Properly trained IT security staff who can analyze, monitor, and protect cybersecurity resources are in high demand. The U.S. Bureau of Labor Statistics (BLS) predicts that information security analysts will be the fastest-growing overall job category, with 37 percent overall growth between 2012 and 2022. And if you're aiming to stack your resumé with a recognized certification and earn big bucks as a security analyst, this course is for you. With 51 lectures, this class will teach you everything you need to know to respond to cybersecurity threats and attacks. It will make you an outstanding cybersecurity analyst and in the process, make sure you are ready to pass the CompTIA exam.

  • Access 51 lectures & 7 hours of content 24/7
  • Apply environmental reconnaissance techniques like OS fingerprinting, e-mail harvesting, & social media profiling using tools such as Nmap, Netstat, and syslog
  • Analyze the results of network reconnaissance, & recommend or implement countermeasures
  • Secure a corporate environment by scanning for vulnerabilities
  • Respond to cyber incidents w/ a forensics toolkit, maintain the chain of custody, & analyze incident severity
Total Seminars
4.7/5 Instructor Rating: ★ ★ ★ ★

Total Seminars provides certification training services and training materials to thousands of schools, corporations, and government agencies including the United Nations, the FBI and all branches of the Department of Defense. Total Seminars produces the #1 selling CompTIA A+ and Network+ Certification books with over 1 million books in print.

Total Seminars has created a number of “Best-Selling” Udemy video courses by Mike Meyers and the Total Seminars team of Instructors. They also develop supplemental materials such as the TotalTester certification practice tests and TotalSims lab simulations to support your certification preparation. These are available on the Total Seminars web site.

Important Details

  • Length of time users can access this course: lifetime
  • Access options: desktop & mobile
  • Redemption deadline: redeem your code within 30 days of purchase
  • Certification of completion included
  • Experience level required: intermediate
  • Have questions on how digital purchases work? Learn more here

Requirements

  • Basic familiarity with computers and networks

Course Outline

  • Introduction to CySA+
    • Introduction - 1:50
  • Conducting Reconnaissance
    • Thinking Like the Enemy - 9:20
    • Tools of the Trade - 7:35
  • Analyzing Reconnaissance Results
    • Recon Results: Part 1 - 13:06
    • Recon Results: Part 2 - 4:52
    • Data Output - 5:01
  • Responding to Network-Based Threats
    • Protecting Your Territory - 4:53
    • Hardening Strategies - 12:42
  • Securing a Corporate Environment
    • Pen Testing - 5:42
    • Training - 4:03
    • Reverse Engineering - 7:42
    • Risk Evaluation - 2:34
  • Vulnerability Management
    • Requirements Identification - 4:50
    • Scanning - 5:49
    • Configuring and Executing Scans - 7:47
    • Reporting and Remediating - 9:24
  • Analyzing Vulnerabilities Scan Results
    • Common Vulnerabilities: Part 1 - 7:58
    • Common Vulnerabilities: Part 2 - 7:50
  • Incident Response
    • Incident Response Process - 6:40
    • IR Roles and Responsibilities - 7:43
  • Preparation Phase
    • IR Active Preparation - 9:45
    • Threat Trends - 7:35
  • Forensic Tools
    • Digital Forensics - 9:37
    • Seizure and Acquisitions - 4:56
    • Forensics Acquisition Tools - 8:57
    • Forensics Analysis: Part 1 - 4:29
    • Forensics Analysis: Part 2 - 7:51
  • Common Symptoms of Compromise
    • Network Symptoms - 3:34
    • Host Symptoms - 8:07
    • Application Symptoms - 4:27
  • Incident Recovery and Post-Incident Response Process
    • Moving Forward: Part 1 - 13:06
    • Moving Forward: Part 2 - 8:02
  • Frameworks, Common Policies, Controls, and Procedures
    • Frameworks - 13:06
    • Policies - 7:31
    • Controls & Procedures - 7:44
    • Verifications - 6:16
  • Identity and Access Management
    • Context-Based Authentication - 6:20
    • Identities - 15:17
    • Managing Identities - 9:43
    • Exploits - 8:12
  • Defense Strategies
    • Data Analytics - 9:48
    • Defense in Depth - 14:14
  • Software Development Life Cycle (SDLC)
    • Secure Software Development - 7:47
    • Best Coding Practices - 4:12
  • Tools and Technologies
    • Preventative Tools: Part 1 - 20:35
    • Preventative Tools: Part 2 - 6:20
    • Collective Tools - 8:57
    • Vulnerability Scanning - 15:54
    • Packet Capture - 11:40
    • Connectivity Tools - 8:00
    • Pen Testing Tools - 11:55

View Full Curriculum


Access
Lifetime
Content
10.0 hours
Lessons
67

CompTIA PenTest+ (PT0-001) Ethical Hacking

Hone Your Cybersecurity Skills with Hands-On Abilities in Penetration Testing & Vulnerability Management

By Total Seminars | in Online Courses

Penetration testing and information security are some of the fastest-growing job categories. So whether you're looking to pass the CompTIA PenTest+ certification exam, take your next step in the CompTIA Cybersecurity Pathway, or you're just looking to learn some awesome ethical hacking skills, you’re in the right place. This course focuses on how to be a pentester. A pen tester plans and scopes a pen test engagement with a client, finds vulnerabilities, exploits them to get into a network, and reports those findings to the client.

4.5/5 average rating: ★ ★ ★ ★

  • Access 67 lectures & 10 hours of content 24/7
  • Use the tools you’ll need to scan networks, crack passwords, analyze & intercept traffic, discover code vulnerabilities, and compromise resources
  • Recognize vulnerabilities within a system, run exploits, & suggest solutions to a client to remediate the weak points
  • Work within a virtual environment to practice your pen-testing skills, including using Oracle VM manager, Kali Linux, Metasploitable, & DVWA
  • Scope, plan, & execute a pen test engagement from start to finish
Total Seminars
4.7/5 Instructor Rating: ★ ★ ★ ★

Total Seminars provides certification training services and training materials to thousands of schools, corporations, and government agencies including the United Nations, the FBI and all branches of the Department of Defense. Total Seminars produces the #1 selling CompTIA A+ and Network+ Certification books with over 1 million books in print.

Total Seminars has created a number of “Best-Selling” Udemy video courses by Mike Meyers and the Total Seminars team of Instructors. They also develop supplemental materials such as the TotalTester certification practice tests and TotalSims lab simulations to support your certification preparation. These are available on the Total Seminars web site.

Important Details

  • Length of time users can access this course: lifetime
  • Access options: desktop & mobile
  • Redemption deadline: redeem your code within 30 days of purchase
  • Certification of completion included
  • Experience level required: intermediate
  • Have questions on how digital purchases work? Learn more here

Requirements

  • Basic familiarity with computers and networks

Course Outline

  • Introduction to PenTest+
    • Welcome to CompTIA PenTest+ (PT0-001) Ethical Hacking - 8:40
  • Chapter 1: Planning and Scoping
    • Planning a Pen Test - 8:54
    • Rules of Engagement - 10:41
    • Resources and Budgets - 7:21
    • Impact and Constraints - 5:17
    • Support Resources - 13:26
    • Legal Groundwork - 11:57
    • Scope Considerations - 10:51
    • Lab Environment Setup - 22:56
    • Project Strategy and Risk - 9:24
    • Scope Vulnerabilities - 13:32
    • Compliance-Based Assessments - 5:25
  • Chapter 2: Surveying the Target
    • Scanning and Enumeration - 4:35
    • Scanning and Enumeration Demo - 10:59
    • Packet Investigation - 8:03
    • Packet Inspection Demo - 6:02
    • Application and Open-Source Resources - 11:52
    • Vulnerability Scanning - 8:50
    • Vulnebarility Scanning Demo - 16:31
    • Target and Asset Considerations - 15:39
    • Nmap Timing and Performance Options - 6:43
    • Prioritization of Vulnerabilities - 9:17
    • Common Attack Techniques - 12:17
    • Credential Attacks - 14:41
    • Weaknesses in Specialized Systems - 18:08
  • Chapter 3: Selecting Your Attack Vector
    • Remote Social Engineering - 6:50
    • Spear Phishing Demo - 10:19
    • In-Person Social Engineering - 12:00
    • Network-Based Exploits - 7:19
    • FTP Exploit Demo - 8:28
    • Man-in-the Middle Exploits - 7:18
    • Wireless Exploits - 13:29
    • Application Exploits, Part 1 - 5:41
    • SQL Injection Demo - 8:48
    • Application Exploits, Part 2 - 8:14
    • Application Exploits, Part 3 - 9:15
    • Cross-Site Scripting Demo - 7:11
    • Code Vulnerabilities - 16:48
    • Local Host Vulnerabilities - 5:08
    • Privilege Escalation (Linux) - 9:49
    • Privilege Escalation (Windows) - 6:17
    • Misc. Privilege Escalation - 8:07
    • Misc. Local Host Vulnerabilities - 8:17
    • Physical Security - 11:27
    • Post-Exploitation Techniques - 11:23
    • Persistence and Stealth - 10:55
  • Chapter 4: Selecting Pen Testing Tools
    • Nmap Scoping and Output Options - 21:15
    • Pen Testing Toolbox - 6:59
    • Using Kali Linux - 6:27
    • Scanners and Credential Tools - 10:22
    • Code Cracking Tools - 4:35
    • Open-Source Research Tools - 6:36
    • Wireless and Web Pen Testing Tools - 11:03
    • Remote Access Tools - 6:28
    • Analyzers and Mobile Pen Testing Tools - 2:43
    • Other Pen Testing Tools - 4:39
    • Using Scripting in Pen Testing - 12:46
    • Bash Scripting Basics - 15:10
    • Bash Scripting Techniques - 10:21
    • PowerShell Scripts - 4:16
    • Ruby Scripts - 6:43
    • Python Scripts - 5:59
    • Scripting Languages Comparison - 11:06
  • Chapter 5: Reporting and Communication
    • Writing Reports - 16:02
    • Post-Report Activities - 5:36
    • Mitigation Strategies - 5:13
    • Communication - 9:54

View Full Curriculum


Access
Lifetime
Content
10.0 hours
Lessons
108

TOTAL: Cloud Computing/CompTIA Cloud+ Cert. (CV0-002)

Learn the Basics of Cloud Computing & Prepare for the CompTIA Cloud+ Certification Exam

By Total Seminars | in Online Courses

Learn the basics of Cloud Computing and prepare for the CompTIA Cloud +Certification. Cloud+ is part of the CompTIA Infrastructure Pathway. Cloud+ is an intermediate-level Network Specialist certification. The median annual salary for a Cloud+ certified tech is $74,300*, and there are currently over 50,000 job postings* for techs with this certification in the US. If you want to learn the basics of the Cloud on a pathway to AWS or Azure Certification, this course will give you the foundational knowledge to begin your journey.

4.6/5 average rating: ★ ★ ★ ★

  • Access 108 lectures & 10 hours of content 24/7
  • Implement appropriate security controls given requirements
  • Analyze system requirements to successfully execute workload migrations to the cloud
  • Determine proper allocation of cloud resources & apply necessary changes, based on performance data
  • Troubleshoot capacity, automation, connectivity & security issues related to cloud implementations
  • Apply appropriate technologies & processes, including automation and orchestration, to ensure desired system performance
Total Seminars
4.7/5 Instructor Rating: ★ ★ ★ ★

Total Seminars provides certification training services and training materials to thousands of schools, corporations, and government agencies including the United Nations, the FBI and all branches of the Department of Defense. Total Seminars produces the #1 selling CompTIA A+ and Network+ Certification books with over 1 million books in print.

Total Seminars has created a number of “Best-Selling” Udemy video courses by Mike Meyers and the Total Seminars team of Instructors. They also develop supplemental materials such as the TotalTester certification practice tests and TotalSims lab simulations to support your certification preparation. These are available on the Total Seminars web site.

Important Details

  • Length of time users can access this course: lifetime
  • Access options: desktop & mobile
  • Redemption deadline: redeem your code within 30 days of purchase
  • Certification of completion included
  • Experience level required: beginner
  • Have questions on how digital purchases work? Learn more here

Requirements

  • At least 24–36 months of work experience in IT networking, network storage or datacenter administration
  • Familiarity with any major hypervisor technologies for server virtualization
  • Knowledge on CompTIA Network+ and/or CompTIA Server+

Course Outline

  • Chapter 0 - What You Need to Know
    • Introduction to the Cloud - 3:35
    • Cloud+ Exam Info - 8:15
    • What Can Cloud+ Do For You? - 3:12
    • Preparing for the Cloud+ Exam - 5:48
  • Chapter 1 - Introducing the Cloud
    • Setting up Your Cloud Accounts - 6:25
    • Defining the Cloud - 7:40
    • Deployment Models - 4:30
    • Public Cloud (Demo) - 8:14
    • Private Cloud (Demo) - 6:08
    • Community Cloud (Demo) - 5:34
    • Hybrid Cloud (Demo) - 4:59
    • Additional Models - 4:36
    • Cloud Architectures - 6:15
    • Capacity, Elasticity, and Support Agreements - 8:29
    • Resource Balancing - 6:43
    • Change Management - 6:33
    • Chapter 1 Quiz
  • Chapter 2 - System Requirements for Cloud Deployments
    • Deployment Exam Objectives Explained - 6:15
    • Cloud Component Interactions, Part 1 - 6:48
    • Cloud Component Interaction, Part 2 - 7:51
    • Non-Cloud Component Interactions - 8:46
    • Platforms and Applications - 5:21
    • Baselines (Lab) - 6:47
    • Target Hosts - 4:35
    • Existing Systems (Lab) - 9:03
    • Architecting for Elements and Targets (Demo) - 6:45
    • Selecting Deployment Tools (Demo) - 7:15
    • Executing a Deployment Plan (Demo) - 9:20
    • Evaluating Testing Plans - 5:21
    • Testing Techniques - 5:13
    • Analyzing Testing Results - 3:41
    • Baseline Confirmation (Lab) - 8:16
    • Deployment Problem Resolution (Lab) - 7:49
    • Chapter 2 Quiz
  • Chapter 3 - Cloud Storage
    • Cloud Storage Types - 5:38
    • Provisioning Storage - 5:44
    • Storage Protection Capabilities - 8:45
    • Storage Features - 5:59
    • Access Protocols - 5:43
    • Storage Management (Demo) - 6:18
    • Storage Security (Lab) - 5:29
    • Disaster Recovery Capabilities (Demo) - 7:19
    • Disaster Recovery Considerations - 4:35
    • Business Continuity Plan (Lab) - 7:03
    • Chapter 3 Quiz
  • Chapter 4 - Cloud Compute
    • Compute Introduction - 5:41
    • CPU Capabilities - 8:10
    • Memory Requirements - 7:07
    • Performance Considerations - 7:15
    • Cost Considerations (Lab) - 7:10
    • Energy Savings - 4:36
    • Dedicated vs. Shared Compute - 3:59
    • High Availability and Disaster Recovery for Compute - 4:39
    • Monitoring (Lab) - 8:14
    • Forecasting - 5:27
    • Policies - 2:50
    • Chapter 4 Quiz
  • Chapter 5 - Cloud Networking
    • Network Components (Demo) - 9:23
    • Network Protocols - 3:35
    • Many protocols used ports for communications. TCP and UDP ports are common. Some protocols use well-known ports and this episode introduces network ports and common ports used by common protocols. - 5:23
    • Virtual Private Networks (VPNs) - 8:11
    • IDS/IPS - 7:23
    • Segmentation - 8:43
    • Network SLAs and Change Management - 4:11
    • Networking in Different Models - 4:58
    • Chapter 5 Quiz
  • Chapter 6 - Cloud Security
    • Security Policies - 5:37
    • Standards and Compliance (Demo) - 5:11
    • Identity, Authentication, and Authorization - 7:45
    • Multi-Factor Authentication (Lab) - 4:36
    • Authorization (Lab) - 8:26
    • Encryption (Demo) - 7:53
    • Compute Security (Demo) - 6:34
    • Account Management (Lab) - 7:02
    • Segmentation (Lab) - 4:48
    • Security Tools (Demo) - 7:05
    • Security Services - 4:49
    • Security Automation and Orchestration - 5:37
    • Models and Security - 5:55
    • Chapter 6 Quiz
  • Chapter 7 - Migrating to the Cloud
    • Migration Types - 7:25
    • Workload Management - 4:47
    • Virtualizing Physical Systems - 6:22
    • Migrating Security - 7:24
    • Protocols and Services - 8:15
    • Environmental Constraints - 6:36
    • Chapter 7 Quiz
  • Chapter 8 - Maintaining Cloud Solutions
    • Planning Patch Management - 6:31
    • Manual Patch Management - 3:49
    • Automated Patch Management (Lab) - 3:29
    • Update Types - 7:34
    • Automated Workflows (Lab) - 7:08
    • Backup Types (Lab) - 9:59
    • Backup Targets and Options - 6:32
    • Maintenance Automation Techniques - 4:52
    • Maintenance Automation Tasks - 6:39
    • Provisioning and Deprovisioning - 6:55
    • Application Life Cycle - 3:09
    • Monitoring and Reporting (Lab) - 7:14
    • Monitoring Metrics - 5:41
    • Chapter 8 Quiz
  • Chapter 9 - Troubleshooting Cloud Solutions
    • Troubleshooting Methodology - 8:17
    • Troubleshooting Deployment - 7:00
    • Troubleshooting Capacity - 7:38
    • Troubleshooting Automation and Orchestration - 6:46
    • Troubleshooting Connectivity - 9:30
    • Troubleshooting Security - 9:01
    • Chapter 9 Quiz

View Full Curriculum


Access
Lifetime
Content
10.0 hours
Lessons
111

TOTAL: CompTIA CySA+ Cybersecurity Analyst (CS0-002)

Learn the Basics of Cloud Computing & Prepare for the CompTIA Cloud+ Certification Exam

By Total Seminars | in Online Courses

Are you looking to get into the exciting world of hackers, cybersecurity, threat hunting, and digital forensics? Do you find the idea of gathering and analyzing intelligence to detect and combat hackers intriguing? Then this is the course for you! This course is aimed at the aspirational junior analyst looking to step up in their career. However, if your tech skills don't include cybersecurity, you can also gain a great deal of knowledge from this course to help launch yourself towards a career in cybersecurity.

4.6/5 average rating: ★ ★ ★ ★

  • Access 108 lectures & 10 hours of content 2487
  • Leverage intelligence & threat detection techniques
  • Analyze & interpret data
  • Identify & address vulnerabilities
  • Suggest preventative measures
  • Effectively respond to & recover from incidents
  • Analyze the results of network reconnaissance & recommend or implement countermeasures
  • Secure a corporate environment
Total Seminars
4.7/5 Instructor Rating: ★ ★ ★ ★

Total Seminars provides certification training services and training materials to thousands of schools, corporations, and government agencies including the United Nations, the FBI and all branches of the Department of Defense. Total Seminars produces the #1 selling CompTIA A+ and Network+ Certification books with over 1 million books in print.

Total Seminars has created a number of “Best-Selling” Udemy video courses by Mike Meyers and the Total Seminars team of Instructors. They also develop supplemental materials such as the TotalTester certification practice tests and TotalSims lab simulations to support your certification preparation. These are available on the Total Seminars web site.

Important Details

  • Length of time users can access this course: lifetime
  • Access options: desktop & mobile
  • Redemption deadline: redeem your code within 30 days of purchase
  • Certification of completion included
  • Experience level required: intermediate
  • Have questions on how digital purchases work? Learn more here

Requirements

  • Basic familiarity with PCs and networks
  • Knowledge on CompTIA Network+ and/or CompTIA Server+

Course Outline

  • Chapter 1: The Importance of Threat Data and Intelligence
    • Intelligence Sources and Confidence Levels - 7:57
    • Threat Indicators and Actors - 7:59
    • Threat Trends - 6:50
    • Intelligence Cycle and ISACs - 6:15
    • Chapter 1: The Importance of Threat Data and Intelligence Quiz
  • Chapter 2: Threat Intelligence in Support of Organizational Security
    • Attack Frameworks - 6:15
    • Threat Research - 11:09
    • Threat Modeling and Intelligence Sharing - 5:33
    • Chapter 2: Threat Intelligence in Support of Organizational Security Quiz
  • Chapter 3: Vulnerability Assessment Tools
    • Vulnerability Identification - 7:25
    • Scanning Parameters and Criteria - 9:13
    • Scanning Special Considerations - 5:36
    • Validation - 3:26
    • Remediation and Mitigation - 7:49
    • Inhibitors to Remediation - 6:58
    • Chapter 3: Vulnerability Assessment Tools Quiz
  • Chapter 4: Threats and Vulnerabilities Associated with Specialized Technology
    • Web Applications Scanners, Part 1 - 9:34
    • Web Applications Scanners, Part 2 - 5:12
    • Scanning - 5:45
    • Configuring and Executing Scans - 7:42
    • Vulnerability Scanning - 9:46
    • Reverse Engineering - 7:37
    • Enumeration - 6:21
    • Wireless Assessment Tools - 7:39
    • Cloud Assessment Tools - 3:35
    • Chapter 4: Threats and Vulnerabilities Associated with Specialized Technology Quiz
  • Chapter 5: Threats and Vulnerabilities Associated with Specialized Technology
    • Mobile and IoT - 9:48
    • Embedded and Firmware Systems (RTOS, SoC, and FPGA) - 9:18
    • Access and Vehicles Risk - 8:01
    • Automation and Control Risk - 10:03
    • Chapter 5: Threats and Vulnerabilities Associated with Specialized Technology Quiz
  • Chapter 6: Threats and Vulnerabilities Associated with Operating in the Cloud
    • Cloud Models - 6:38
    • Remote Service Invocation (FaaS, IaC, API) - 9:32
    • Cloud Vulnerabilities - 6:10
    • Chapter 6: Threats and Vulnerabilities Associated with Operating in the Cloud
  • Chapter 7: Mitigating Controls for Attacks and Software Vulnerabilities
    • Injection and Overflow Attacks - 9:25
    • Authentication Attacks - 6:33
    • Exploits - 8:08
    • Application Vulnerabilities, Part 1 - 7:37
    • Application Vulnerabilities, Part 2 - 6:57
    • Chapter 7: Mitigating Controls for Attacks and Software Vulnerabilities Quiz
  • Chapter 8: Security Solutions for Infrastructure Management
    • Network Architecture and Asset Management - 8:50
    • Protecting Your Territory - 4:49
    • Identity and Access Management - 11:17
    • Encryption and Active Defense - 8:26
    • Chapter 8: Security Solutions for Infrastructure Management Quiz
  • Chapter 9: Software Assurance Best Practices
    • Platforms - 7:00
    • SOA and DevSecOps - 8:44
    • Secure Software Development - 7:43
    • Best Coding Practices - 4:08
    • Chapter 9: Software Assurance Best Practices Quiz
  • Chapter 10: Hardware Assurance Best Practices
    • Trusted Hardware - 9:43
    • Hardware Encryption - 4:28
    • Hardware Security - 7:44
    • Chapter 10: Hardware Assurance Best Practices Quiz
  • Chapter 11: Data Analysis in Security Monitoring Activities
    • Data Analytics - 9:44
    • Endpoint Security - 7:32
    • Recon Results, Part 1 - 13:01
    • Recon Results, Part 2 - 4:47
    • Impact Analysis - 4:30
    • Collective Tools - 8:53
    • Query Writing - 6:43
    • E-mail Analysis, Part 1 - 9:30
    • E-mail Analysis, Part 2 - 7:56
    • Chapter 11: Data Analysis in Security Monitoring Activities Quiz
  • Ch12: Implement Configuration Changes to Existing Controls to Improve Security
    • Permissions - 8:50
    • Firewalls - 7:30
    • Intrusion Prevention Rules - 5:16
    • DLP and Endpoint Detection - 4:57
    • Chapter 12: Implement Configuration Changes to Existing Controls to Improve Security Quiz
  • Chapter 13: The Importance of Proactive Threat Hunting
    • Threat Hunting and the Hypothesis - 6:26
    • Threat Hunting Process - 7:14
    • Results and Benefits - 4:54
    • Chapter 13: The Importance of Proactive Threat Hunting Quiz
  • Chapter 14: Compare and Contrast Automation Concepts and Technologies
    • Workflow and Scripting - 7:27
    • API and Malware Signature Creation - 7:46
    • Threat Feeds and Machine Learning - 6:02
    • Protocols, Standards, and Software Engineering - 5:15
    • Chapter 14: Compare and Contrast Automation Concepts and Technologies Quiz
  • Chapter 15: The Importance of the Incident Response Process
    • IR Roles and Responsibilities - 7:38
    • IR Active Preparation - 9:41
    • Chapter 15: The Importance of the Incident Response Process Quiz
  • Chapter 16: Appropriate Incident Response Procedures
    • Incident Response Process - 6:36
    • Chapter 16: Appropriate Incident Response Procedures Quiz
  • Chapter 17: Analyze Potential Indicators of Compromise
    • Network Symptoms - 3:30
    • Host Symptoms - 8:03
    • Application Symptoms - 4:22
    • Chapter 17: Analyze Potential Indicators of Compromise Quiz
  • Chapter 18: Utilize Basic Digital Forensics Techniques
    • Digital Forensics - 9:33
    • Seizure and Acquisitions - 4:52
    • Forensics Acquisition Tools - 8:52
    • Mobile, Virtualization, and Cloud - 5:51
    • Forensics Analysis, Part 1 - 4:24
    • Forensics Analysis, Part 2 - 7:46
    • Packet Capture - 11:36
    • Chapter 18: Utilize Basic Digital Forensics Techniques Quiz
  • Chapter 19: The Importance of Data Privacy and Protection
    • Data Privacy and Security - 6:13
    • Nontechnical Controls - 8:47
    • Technical Controls - 7:48
    • Chapter 19: The Importance of Data Privacy and Protection Quiz
  • Chapter 20: Security Concepts in Support of Organizational Risk Mitigation
    • Business Impact Analysis - 4:30
    • Risk Identification - 5:18
    • Risk Calculation and Communication - 6:10
    • Training - 3:59
    • Supply Chain Assessment - 4:12
    • Chapter 20: Security Concepts in Support of Organizational Risk Mitigation Quiz
  • Chapter 21: The Importance of Frameworks, Policies, Procedures, and Controls
    • Frameworks - 13:01
    • Policies and Procedures - 4:29
    • Controls and Procedures - 7:39
    • Verification - 6:11
    • Chapter 21: The Importance of Frameworks, Policies, Procedures, and Controls Quiz

View Full Curriculum


Access
Lifetime
Content
17.0 hours
Lessons
122

TOTAL: CompTIA Security+ Certification (SY0-601)

Everything You Need to Know to Pass the CompTIA Security+ (SY0-601) Exam

By Total Seminars | in Online Courses

This is a complete and comprehensive CompTIA Security+ Certification (SY0-601) course. It is designed to prepare you to take and pass the exam to become CompTIA Security+ certified. Once you complete the course, you will have the knowledge and confidence to pass the CompTIA exam AND the skills to be a great IT security tech. This course is ideal as both a study tool and an on-the-job reference. Your new skills and the CompTIA Security+ Certification will help you land a great IT security tech job. Or, if you are already a security tech, get that raise or advancement you are after.

4.8/5 average rating: ★ ★ ★ ★

  • Access 122 lectures & 17 hours of content 24/7
  • Apply the three “A’s” of security: authentication, authorization, and accounting
  • Scan your wired or wireless network & assess it for various weaknesses
  • Use cryptography to assure the integrity of data through hashing and confidentiality of data through symmetric/asymmetric cryptosystems and public key infrastructure (PKI)
  • Understand critical concepts in risk management, like setting up alerts, responding to incidents, & mitigating vulnerabilities
  • Identify how hackers are trying to get into your network, IT infrastructure, & physical assets and how security techs help prevent those breaches
  • Prevent attacks ranging from simple malware to sophisticated exploits to social engineering that takes advantage of people’s trust, relationships, and lack of knowledge
  • Apply the techniques used in penetration testing, including passive and active reconnaissance
  • Secure an enterprise environment, including creating an incident response, business continuity, and disaster recovery plans
Total Seminars
4.7/5 Instructor Rating: ★ ★ ★ ★

Total Seminars provides certification training services and training materials to thousands of schools, corporations, and government agencies including the United Nations, the FBI and all branches of the Department of Defense. Total Seminars produces the #1 selling CompTIA A+ and Network+ Certification books with over 1 million books in print.

Total Seminars has created a number of “Best-Selling” Udemy video courses by Mike Meyers and the Total Seminars team of Instructors. They also develop supplemental materials such as the TotalTester certification practice tests and TotalSims lab simulations to support your certification preparation. These are available on the Total Seminars web site.

Important Details

  • Length of time users can access this course: lifetime
  • Access options: desktop & mobile
  • Redemption deadline: redeem your code within 30 days of purchase
  • Certification of completion included
  • Experience level required: intermediate
  • Have questions on how digital purchases work? Learn more here

Requirements

  • Basic familiarity with PCs and networks
  • Knowledge on CompTIA Network+ and/or CompTIA Server+

Course Outline

  • Chapter 1: Risk Management
    • Defining Risk - 8:23
    • Threats and Vulnerabilities - 7:04
    • Threat Intelligence - 10:59
    • Risk Management Concepts - 7:24
    • Security Controls - 9:22
    • Risk Assessments and Treatments - 5:44
    • Quantitative Risk Assessments - 6:38
    • Qualitative Risk Assessments - 3:54
    • Business Imapct Analysis - 9:18
    • Data Types and Roles - 11:29
    • Security and the Information Life Cycle - 9:03
    • Data Destruction - 6:04
    • Personnel Risk and Policies - 10:22
    • Third-Party Risk Management - 8:29
    • Agreement Types - 6:31
  • Chapter 2: Cryptography
    • Cryptography Basics - 15:56
    • Data Protection - 8:36
    • Cryptographic Methods - 7:19
    • Symmetric Cryptosystems - 12:42
    • Symmetric Block Modes - 8:15
    • Asymmetric Cryptosystems - 12:48
    • Diffie-Hellman - 6:35
    • Hashing - 8:42
    • Understanding Digital Certificates - 7:39
    • Trust Models - 4:45
    • Public Key Infrastructure - 3:39
    • Certificate Types - 14:10
    • Touring Certificates - 8:47
    • Cryptographic Attacks - 5:23
    • Password Cracking - 10:13
    • Password Cracking Demo - 6:08
  • Chapter 3: Identity and Account Management
    • Identification, Authentication, and Authorization - 8:01
    • Enabling Multifactor Authentication - 4:46
    • Authorization - 4:50
    • Accounting - 5:24
    • Authentication Methods - 14:06
    • Access Control Schemes - 6:50
    • Account Management - 13:05
    • Network Authentication - 9:04
    • Identity Management Systems - 5:52
  • Chapter 4: Tools of the Trade
    • Touring the CLI - 16:28
    • Shells - 6:17
    • The Windows Command Line - 4:36
    • Microsoft PowerShell - 12:33
    • Linux Shells - 11:48
    • Python Scripts - 7:25
    • Windows Command-Line Tools - 16:22
    • Linux Command-Line Tools - 9:35
    • Network Scanners - 5:14
    • Network Scanning with Nmap - 8:58
    • Network Protocol Analyzers - 8:01
    • Using Wireshark to Analyze Network Traffic - 9:04
    • Using tcpdump to Analyze Network Traffic - 8:16
    • Log Files - 8:56
    • Centralized Logging - 9:03
    • Configuring Linux Log Forwarding - 8:28
  • Chapter 5: Securing Individual Systems
    • Malware - 13:42
    • Weak Configurations - 11:36
    • Common Attacks - 9:05
    • Driver and Overflow Attacks - 7:54
    • Password Attacks - 8:04
    • Bots and Botnets - 6:13
    • Disk RAID Levels - 10:19
    • Securing Hardware - 11:04
    • Securing Endpoints - 9:03
  • Chapter 6: The Basic LAN
    • The OSI Model - 12:30
    • ARP Cache Poisoning - 8:45
    • Other Layer 2 Attacks - 5:22
    • Network Planning - 7:04
    • Load Balancing - 5:39
    • Securing Network Access - 6:23
    • Honeypots - 6:01
    • Firewalls - 11:17
    • Proxy Servers - 6:15
    • Network and Port Address Translation - 6:50
    • IP Security (IPsec) - 8:59
    • Virtual Private Networks (VPNs) - 10:07
    • Intrusion Detection and Prevention Systems (IDS/IPS) - 13:02
  • Chapter 7: Securing Wireless LANs
    • Wi-Fi Encryption Standards - 9:43
    • RFID, NFC, and Bluetooth - 6:50
    • Wi-Fi Coverage and Performance - 8:21
    • Wi-Fi Discovery and Attacks - 12:10
    • Cracking WPA2 - 10:24
    • Wi-Fi Hardening - 10:30
  • Chapter 8: Securing Public Servers
    • Defining a Public Server - 0:45
    • Common Attacks and Mitigations - 9:47
    • Containers and Software-Defined Networking - 11:28
    • Hypervisors and Virtual Machines - 8:25
    • Cloud Deployment Models - 8:45
    • Cloud Service Models - 8:27
    • Securing the Cloud - 10:21
  • Chapter 9: Securing Dedicated Systems
    • Embedded Systems - 13:19
    • Industrial Control System (ICS) - 6:43
    • Internet of Things (IoT) Devices - 10:04
    • Connecting to Dedicated and Mobile Systems - 10:52
    • Security Constraints for Dedicated Systems - 5:09
    • Mobile Device Deployment and Hardening - 11:03
  • Chapter 10: Physical Security
    • Physical Security Overview - 0:58
    • Physical Security - 9:52
    • Keylogger Demo - 4:44
    • Environmental Controls - 5:23
  • Chapter 11: Secure Protocols and Applications
    • DNS Security - 5:10
    • FTP Packet Capture - 3:29
    • Secure Web and E-mail - 11:58
    • Request Forgery Attacks - 4:56
    • Cross-Site Scripting Attacks - 7:16
    • Web Application Security - 8:02
    • Web App Vulnerability Scanning - 5:43
  • Chapter 12: Testing Infrastructure
    • Testing Infrastructure Overview - 4:31
    • Social Engineering - 5:58
    • Social Engineering Attacks - 10:47
    • Vulnerability Assessments - 9:00
    • Penetration Testing - 9:47
    • Security Assessment Tools - 11:38
    • The Metasploit Framework - 8:09
  • Chapter 13: Dealing with Incidents
    • Incident Response Overview - 2:58
    • Incident Response Plans (IRPs) - 6:01
    • Threat Analysis and Mitigating Actions - 7:40
    • Digital Forensics - 12:14
    • Gathering Digital Evidence - 9:44
    • Business Continuity and Alternate Sites - 6:11
    • Data Backup - 9:45

View Full Curriculum


Access
Lifetime
Content
14.0 hours
Lessons
106

TOTAL: CompTIA A+ Certification Core 2 (220-1002)

Be a CompTIA A+ Certified Professional with Expanded Skills on Configurations, Security Software Troubleshooting & Operational Procedures

By Total Seminars | in Online Courses

The CompTIA A+ certification is an IT credential trusted by employers worldwide to identify the go-to person in endpoint management & technical support roles. It requires two exams: Core 1 (220-1001) and Core 2 (220-1002), and this course will help you ace the latter. With 106 lectures, this video series will cover installing and configuring operating systems, expanded security, software troubleshooting, and operational procedures. It will help you with these more advanced concepts and prepare you to complete the CompTIA A+ certification.

4.8/5 average rating: ★ ★ ★ ★

  • Access 106 lectures & 14 hours of content 24/7
  • Learn everything about operating systems: Windows, Mac, Linux, iOS, Android
  • Secure your computer, mobile device, & network
  • Learn the industry standards & best practices for documentation, change management, disaster prevention, and recovery, procedures, and policies
  • Understand security concepts like malware, antivirus, anti-malware, & networking security protocols
Total Seminars
4.7/5 Instructor Rating: ★ ★ ★ ★

Total Seminars provides certification training services and training materials to thousands of schools, corporations, and government agencies including the United Nations, the FBI and all branches of the Department of Defense. Total Seminars produces the #1 selling CompTIA A+ and Network+ Certification books with over 1 million books in print.

Total Seminars has created a number of “Best-Selling” Udemy video courses by Mike Meyers and the Total Seminars team of Instructors. They also develop supplemental materials such as the TotalTester certification practice tests and TotalSims lab simulations to support your certification preparation. These are available on the Total Seminars web site.

Important Details

  • Length of time users can access this course: lifetime
  • Access options: desktop & mobile
  • Redemption deadline: redeem your code within 30 days of purchase
  • Certification of completion included
  • Experience level required: intermediate
  • Have questions on how digital purchases work? Learn more here

Requirements

  • Basic familiarity with PCs and networks
  • 9-12 months of on-the-job experience before taking the A+ exam

Course Outline

  • All About the CompTIA A+ Core 2 (220-1002) Exam
    • CompTIA A+ Core 2 (220-1002) Introduction - 2:29
    • What is the CompTIA A+? - 2:12
    • Why get CompTIA A+ Certified? - 2:52
    • What is on the CompTIA A+ Core 2 (220-1002) Exam? - 4:13
    • How to Pass the CompTIA A+ Exams - 4:14
    • How to Use this Video Course - 2:32
  • Book Chapter 1 - Safety and Professionalism
    • Professional Communication, Part 1 - 6:19
    • Professional Communication, Part 2 - 7:28
    • Physical Safety - 7:08
  • Book Chapter 2 - The Visible Computer
    • What is an Operating System? - 9:23
    • Users and Super Users - 5:22
    • Why Windows? - 7:46
    • Windows Editions and Versions - 11:35
    • Touring the macOS - 6:27
    • Touring Linux - 7:55
  • Book Chapter 3 - CPUs
    • 32-Bit vs. 64-Bit Processing - 11:58
  • Book Chapter 4 - RAM
    • Virtual Memory - 6:25
  • Book Chapter 7 - Power Supply
    • Power Protection - 9:40
  • Book Chapter 9 - Implementing Mass Storage
    • Understanding Partitioning - 4:15
    • MBR Partitioning - 11:59
    • GPT Partitioning - 8:33
    • Understanding File Systems - 11:33
    • Popular File Systems - 7:10
    • Formatting in Action - 11:07
    • Dynamic Disks - 8:33
    • Software RAID in Storage Spaces - 9:35
    • Encrypting Mass Storage - 9:28
  • Book Chapter 11 - Building a PC
    • Boot from Everything - 11:53
    • Installing Windows - 12:08
    • Post-Installation Tasks - 11:34
    • Windows Installation options - 6:43
  • Book Chapter 12 - Windows Under the Hood
    • What is the Registry? - 10:38
    • Processes - 7:00
    • Services - 4:25
    • Your Windows Toolset - 8:20
    • Windows 7 Task Manager - 8:53
    • Windows 10 Task Manager - 5:46
    • Information and Configuration Tools - 10:48
    • Performance Monitor - 11:31
    • Event Viewer - 7:09
    • Tools for Programmers - 7:32
  • Book Chapter 13 - Users, Groups, and Permissions
    • Introduction to Users and Groups - 6:28
    • Managing Users and Groups - 12:14
    • NTFS Permissions - 8:18
    • Linux and macOS Permissions - 4:59
    • File Explorer - 13:36
    • Sharing Resources - 10:34
    • Security Policies - 7:52
  • Book Chapter 14 - Maintaining and Optimizing Operating Systems
    • Patch Management - 11:13
    • Working with Disks - 6:20
    • Working with Applications - 7:19
    • System Restore - 4:43
    • Backing up Your Files - 7:25
    • Task Scheduler - 6:48
  • Book Chapter 15 - Working with the Command-Line Interface
    • Understanding the CLI - 11:02
    • Navigating the CLI - 13:40
    • Working with Folders - 6:39
    • Working with Files - 11:06
    • Working with Drives - 13:02
    • Super Copy Commands - 8:32
    • Advanced Windows Command Line - 7:51
    • Advanced Linux Commands - 13:17
    • Command-Line Permissions - 7:34
    • Introduction to Scripting - 9:45
    • Interpreted Languages - 12:25
  • Book Chapter 16 - Troubleshooting Operating Systems
    • Windows Recovery Environment - 5:20
    • Advanced Windows Startup Options - 7:07
    • Troubleshooting Boot Problems - 9:44
    • Troubleshooting at the GUI - 11:25
    • Troubleshooting Applications - 6:42
    • Kernel Panic - 5:10
  • Book Chapter 17 - Display Technologies
    • Resolutions and Aspect Ratios - 6:16
    • Multiple Monitors - 4:49
  • Book Chapter 18 - Essentials of Networking
    • Network Card Troubleshooting - 9:24
  • Book Chapter 19 - Local Area Networking
    • Working with Connections - 9:12
    • Working with Workgroups - 8:11
    • Working with Active Directory - 13:50
    • Windows Sharing with Mac and Linux - 7:15
    • Net Command - 4:27
    • Firewall Configuration - 10:55
    • Windows Firewall - 7:56
    • Port Forwarding - 7:24
  • Book Chapter 20 - Wireless Networking
    • Wireless Encryption - 10:40
    • Enterprise Wireless - 15:41
  • Book Chapter 21 - The Internet
    • Telnet and SSH - 6:59
    • Remote Desktop Connections - 6:17
    • The World Wide Web - 9:07
    • Troubleshooting Internet Connections - 6:59
  • Book Chapter 23 - Portable Computing
    • Power Management - 11:10
  • Book Chapter 25 - Care and Feeding of Mobile Devices
    • Mobile Device Security - 7:52
    • Mobile Security Troubleshooting - 5:48
    • Mobile Device Troubleshooting - 9:36
  • Book Chapter 27 - Securing Computers
    • Threats - 9:48
    • Physical Security - 8:22
    • Passwords and Authentication - 13:48
    • Malware - 13:43
    • Anti-Malware - 11:29
    • Social Engineering - 5:50
    • Licensing - 9:37
    • Incident Response - 5:05
    • Environmental Controls - 6:02
  • Book Chapter 28 - Operational Procedures
    • Documents You Need to Know - 8:54
    • Data You Need to Know - 4:08
    • Change Management - 5:53
    • The Zen of Backup - 11:16
    • Recycling and Data Destruction - 6:37

View Full Curriculum


Access
Lifetime
Content
18.0 hours
Lessons
235

CompTIA Security+(SY0-601) Complete Course

CompTIA Security+ Topics & Sample Questions Required for the CompTIA Security SY601 Exam

By Oak Academy | in Online Courses

Every internet-connected person is affected by issues about cybersecurity. As a result, cybersecurity professionals are increasingly in demand. That’s why Udemy offers top-rated CompTIA Security+ exam prep courses to help you prepare for the job market. This course walks you through all the things you need to pass the CompTIA Security + (SY601) exam, step by step. You can pass the CompTIA Security + exam by studying the topics covered throughout the course.

4.4/5 average rating: ★ ★ ★ ★

  • Access 235 lectures & 18 hours of content 24/7
  • Assess the cybersecurity posture of an enterprise environment
  • Recommend & implement appropriate cybersecurity solutions
  • Monitor & secure hybrid environments
  • Operate with an awareness of applicable laws & policies
  • Identify, analyze & respond to cybersecurity events and incidents
  • Utilize appropriate data sources to support an investigation
  • Use mitigation techniques or controls to secure an environment
  • Compare various types of controls
Oak Academy | Long Live Tech Knowledge
4.5/5 Instructor Rating: ★ ★ ★ ★

Oak Academy is a group of tech experts who have been in the sector for years and years. Deeply rooted in the tech world, they know that the tech industry's biggest problem is the "tech skills gap" and their online course are their solution. They specialize in critical areas like cybersecurity, coding, IT, game development, app monetization, and mobile. Thanks to their practical alignment, they are able to constantly translate industry insights into the most in-demand and up-to-date courses.

Important Details

  • Length of time users can access this course: lifetime
  • Access options: desktop & mobile
  • Redemption deadline: redeem your code within 30 days of purchase
  • Certification of completion included
  • Experience level required: all levels
  • Have questions on how digital purchases work? Learn more here

Requirements

  • Basic familiarity with PCs and networks

Course Outline

  • Introduction
    • 1 - Introduction to comptia security + - 11:34
  • Basic Security Concepts
    • 2 - What is security? - 2:22
    • 3 - Privacy-Integrity-Availability - 3:15
    • 4 - Encryption and Access Control - 2:54
    • 5 - 3 A Rule (Authentication, Authorization and Accounting) - 3:52
    • 6 - Threat - 3:45
    • 7 - What is a Hacker? - 6:27
    • 8 - What is Attack? What are the Stages? - 3:19
    • 9 - Single Point Of Failure (SPOF) - 3:13
    • 10 - Introducing Basic Risk Concepts - 3:22
  • Identity Management
    • 11 - What is Identity Management? - 2:14
    • 12 - KERBEROS & NTLM&LDAP - 7:31
    • 13 - Single Sign-On (SSO) - 11:02
    • 14 - Smart Cards - 2:58
    • 15 - Tokens or Key Fobs - 5:20
    • 16 - Biometric Methods - 7:36
    • 17 - Dual-Factor and Multifactor Authentication - 1:38
    • 18 - PAP / CHAP / MS-CHAP - 2:46
    • 19 - RADIUS - 6:26
  • Summary-1
    • 20 - Summary-1 - 3:26
  • Users
    • 21 - Create a User - 3:03
    • 22 - Managing Accounts - 1 - 11:44
    • 23 - Managing Accounts - 2 - 9:20
    • 24 - Passwords - 9:18
    • 25 - Password Policy - 9:02
  • Comparing Access Control Models
    • 26 - Comparing Access Control Models - 2:19
    • 27 - Role-Based Access Control - 3:15
    • 28 - Establishing Access with Group-Based Privileges - 4:42
    • 29 - Rule Based and Discretionary Access Control - 5:39
    • 30 - Mandatory Access Control - 2:46
    • 31 - Establishing Access - 6:07
  • Virtualization
    • 32 - What is Virtualization? - 3:46
    • 33 - Virtualization Technologies - 2:55
    • 34 - Benefits of Virtualization - 5:00
    • 35 - Security Issues of Virtualization - 3:50
  • Network Technologies
    • 36 - Basic Network Concepts - 15:38
    • 37 - Domain Name Services (DNS) - 9:47
    • 38 - What is the port? How does it work? - 5:10
    • 39 - What is the Network Address - 7:05
    • 40 - Combining the IP Address and the Port - 4:37
    • 41 - Switches - 5:03
    • 42 - Bridge - 3:07
    • 43 - Routers - 9:29
    • 44 - Understanding NAT and PAT - 2:37
    • 45 - Network Separation - 3:16
    • 46 - Proxy Servers - 7:13
    • 47 - Types of Using Network Technologies - 1 - 9:12
    • 48 - Types of Using Network Technologies - 2 - 8:26
  • Wireless Networks
    • 49 - Reviewing Basic Wireless Network Information - 6:29
    • 50 - Wireless Cryptographic Protocols - 7:38
    • 51 - Authentication Protocols for Wireless Networks - 6:24
  • Summary-2
    • 52 - Summary-2 - 3:02
  • Network Security Technologies
    • 53 - Firewalls - 9:28
    • 54 - Network Access Control - 9:27
    • 55 - Implementing a Secure Network - 5:15
  • Intrusion Detection Systems
    • 56 - Understanding IDSs and IPSs - 4:46
    • 57 - Detection Methods - 11:49
    • 58 - Honeypots - 4:42
  • Virtual Private Network(VPN) Technologies
    • 59 - Using VPNs for Remote Access - 3:54
    • 60 - VPN Tunnel Protocols - 6:18
    • 61 - Site-to-Site VPNs - 2:36
  • Security Threats
    • 62 - Understanding Threat Actors - 12:36
    • 63 - Viruses - 2:10
    • 64 - Logic Bombs - 3:21
    • 65 - Trojans - 5:30
    • 66 - Ransomware - 3:24
    • 67 - Spyware - 3:03
    • 68 - Bots and Botnets - 4:17
    • 69 - Unified Threat Management (UTM) - 5:55
  • Securing Wireless Networks
    • 70 - Disable SSID Broadcasting or Not - 1:26
    • 71 - Enable MAC Filtering - 1:53
  • Understanding Wireless Attacks
    • 72 - Disassociation Attacks - 1:58
    • 73 - WPS and WPS Attacks - 1:50
    • 74 - Rogue AP - 2:14
    • 75 - Evil Twin - 2:08
    • 76 - Jamming Attacks - 3:47
    • 77 - Bluetooth Attacks - 2:51
    • 78 - RFID Attacks - 2:40
    • 79 - Wireless Replay Attacks - 1:49
  • Summary-3
    • 80 - Summary-3 - 2:44
  • Network Attacks
    • 81 - Network Attacks - 3:39
    • 82 - SYN Flood Attack - 2:55
    • 83 - MAC Flood Attacks - 2:53
    • 84 - Man-in-the-Middle Attacks - 1:33
    • 85 - ARP Poisoning Attacks - 3:49
    • 86 - DNS Attacks - 6:17
  • Password Attacks
    • 87 - Brute Force Attacks - 3:32
    • 88 - Password Hashes - 4:53
    • 89 - Birthday Attacks - 4:50
    • 90 - Replay Attacks - 3:25
    • 91 - Hijacking and Related Attacks - 5:59
    • 92 - Driver Manipulation - 2:07
  • Zero-Day Attacks
    • 93 - Zero-Day Attacks - 4:19
  • Code Attacks
    • 94 - Code Reuse and SDKs - 4:31
    • 95 - Code Quality and Testing - 2:51
    • 96 - Development Life-Cycle Models - 3:42
    • 97 - Secure DevOps - 3:19
    • 98 - Version Control and Change Management - 2:17
    • 99 - Provisioning and Deprovisioning - 1:48
  • Web Server Attacks
    • 100 - Web Servers - 2:07
    • 101 - SQL Injection Attacks - 4:32
    • 102 - Protecting Against SQL Injection Attacks - 2:38
    • 103 - DLL Injection - 2:24
    • 104 - Cross-Site Scripting - 6:40
  • Social Engineering Attacks
    • 105 - Social Engineering - 4:09
    • 106 - Shoulder Surfing - 1:06
    • 107 - Tricking Users with Hoaxes - 1:18
    • 108 - Tailgating and Mantraps - 1:12
    • 109 - Dumpster Diving - 1:26
    • 110 - Watering Hole Attacks - 1:06
    • 111 - Spam - 2:04
    • 112 - Phishing - 6:24
    • 113 - Whaling - 2:45
    • 114 - Vishing - 3:08
    • 115 - Beware of Email from Friends - 2:00
    • 116 - Why Social Engineering Works - 9:31
  • Summary - 4
    • 117 - Summary-4 - 3:32
  • Memory Buffer Vulnerabilities
    • 118 - Memory Leak - 2:41
    • 119 - Buffer Overflow Attacks - 4:16
    • 120 - Pointer Dereference - 2:07
    • 121 - Compiled Versus Runtime Code - 1:20
    • 122 - Proper Input Validation - 4:07
    • 123 - Side Input Validation - 3:20
    • 124 - Avoiding Race Conditions - 2:13
    • 125 - Proper Error Handling - 2:14
    • 126 - Cryptographic Techniques - 1:43
  • Preventing Attacks
    • 127 - Protecting Systems from Malware - 2:05
    • 128 - Antivirus and Anti-Malware Software - 8:22
    • 129 - Advanced Malware Tools - 3:31
    • 130 - Educating Users - 1:53
    • 131 - Implementing Defense in Depth - 3:35
  • Server Security
    • 132 - Implementing Secure Systems - 4:11
    • 133 - Operating systems - 4:12
    • 134 - Secure Operating System Configurations - 6:33
    • 135 - Resiliency and Automation Strategies - 4:56
    • 136 - Change Management Policy - 7:09
    • 137 - Secure Staging and Deployment - 5:26
    • 138 - Peripherals - 4:10
    • 139 - EMI and EMP - 7:46
    • 140 - Hardware Security Module - 2:26
    • 141 - Cloud Deployment Models - 5:29
    • 142 - Cloud Services - 6:20
    • 143 - Security Responsibilities with Cloud Models - 1:52
  • Mobile Devices
    • 144 - Deploying Mobile Devices Securely - 2:14
    • 145 - Deployment Models - 8:35
    • 146 - Mobile Device Management - 9:26
    • 147 - Unauthorized Software - 5:03
    • 148 - Hardware Control - 2:42
    • 149 - Unauthorized Connections - 2:32
  • Exploring Embedded Systems
    • 150 - Exploring Embedded Systems - 7:06
    • 151 - Understanding Stuxnet - 2:13
    • 152 - Real-Time Operating Systems - 3:16
  • Summary-5
    • 153 - Summary-5 - 4:13
  • Data Security
    • 154 - Protecting Data - 11:24
    • 155 - Data Loss Prevention - 5:31
  • Database Security
    • 156 - Database Concepts - 2:47
    • 157 - Normalization - 5:26
    • 158 - SQL Queries - 1:56
    • 159 - Database Security - 0:57
  • Risk Management
    • 160 - Understanding Risk Management - 2:39
    • 161 - Risk Management - 2:45
    • 162 - Threats and Threat Assessments - 4:22
    • 163 - Vulnerabilities - 2:03
    • 164 - Risk Assessment - 13:06
    • 165 - Risk Registers - 5:51
  • Checking for Vulnerabilities
    • 166 - Checking for Vulnerabilities - 1:52
    • 167 - Password Crackers - 1:59
    • 168 - Network Scanners - 5:23
    • 169 - Wireless Scanners / Cracker - 3:17
    • 170 - Banner Grabbing - 0:47
    • 171 - Vulnerability Scanning - 11:23
  • Penetration Tests
    • 172 - Penetration Tests - 2:45
    • 173 - Passive & Active Reconnaissance - 2:02
    • 174 - Initial Exploitation - 3:45
    • 175 - White, Gray and Black Box Testing - 3:00
    • 176 - Intrusive and Non-Intrusive Testing - 1:22
    • 177 - Passive Versus Active Tools - 11:41
  • Physical Security Precautions
    • 178 - Comparing Physical Security Controls - 3:28
    • 179 - Comparing Door Lock Types - 5:33
    • 180 - Preventing Tailgating with Mantraps - 2:00
    • 181 - Increasing Physical Security with Guards - 8:20
    • 182 - Using Hardware Locks - 2:56
    • 183 - Asset Management - 2:33
    • 184 - Implementing Environmental Controls - 14:02
  • Summary-6
    • 185 - Summary-6 - 1:59
  • Single Point of Failure
    • 186 - Single Point of Failure - 1:46
    • 187 - Disk Redundancies - 4:24
    • 188 - Server Redundancy and High Availability - 9:11
    • 189 - Backup - 15:18
  • Business Continuity Plans
    • 190 - Comparing Business Continuity Elements - 6:09
    • 191 - Impact - 3:54
    • 192 - Recovery Time Objective - 4:55
    • 193 - Recovery Sites - 5:53
    • 194 - Disaster Recovery - 8:11
  • Examination of Logs
    • 195 - Monitoring Logs for Event Anomalies - 8:43
    • 196 - OtherLogs-SIEM - 7:12
    • 197 - Continuous Monitoring - 6:08
  • Controls
    • 198 - Understanding Control Types - 7:12
    • 199 - Control Goals - 10:53
  • Cryptography and PKI
    • 200 - Introducing Cryptography Concepts - 3:08
    • 201 - Hashing - 4:43
    • 202 - MD5 - 0:54
    • 203 - SHA - 2:55
    • 204 - HMAC - 2:49
    • 205 - Hashing_Files - 2:56
    • 206 - DigitalSignaturesCertificatesandNo_Denial - 2:52
    • 207 - Hashing Messages - 4:35
    • 208 - Providing Confidentiality with Encryption - 8:16
    • 209 - Block Versus Stream Ciphers - 4:09
    • 210 - Symmetric Encryption - 1:55
    • 211 - Symmetric Encryption Methods - 6:19
    • 212 - Asymmetric Encryption - 1:56
    • 213 - Certificates - 3:58
    • 214 - Steganography And Obfuscation - 2:40
    • 215 - Using Cryptographic Protocols - 1:49
    • 216 - Cipher Suites - 3:38
    • 217 - Exploring PKI Components - 8:04
    • 218 - Recovery Agent - 1:08
    • 219 - Comparing Certificate Types - 4:37
    • 220 - Certificate Formats - 3:10
  • Protecting Email
    • 221 - Protecting Email - 1:51
    • 222 - Encrypting Email - 3:39
    • 223 - HTTPS Transport Encryption - 5:08
  • Risk Mitigation Methods
    • 224 - Exploring Security Policies - 1:14
    • 225 - Personnel Management Policies - 10:41
    • 226 - Background Check - 2:50
    • 227 - NDA - 4:40
    • 228 - Policy Violations and Adverse Actions - 1:37
    • 229 - Agreement Types - 3:02
    • 230 - PII and PHI - 5:13
    • 231 - Responding to Incidents - 2:33
    • 232 - Providing Training - 5:32
    • 233 - Troubleshooting Personnel Issues - 2:28
  • Summary-7
    • 234 - Summary-7 - 1:41
  • Conclusion
    • 235 - Conclusion - 11:23

View Full Curriculum



Terms

  • Unredeemed licenses can be returned for store credit within 30 days of purchase. Once your license is redeemed, all sales are final.