Autoplay
Autocomplete
Previous Lesson
Complete and Continue
The Absolute CompTIA Security+ Certification Path (SY0-701) with Practice Exam
01 Compare and contrast various types of security controls
01 01 Security Control Categories (2:22)
01 02 Security Control Types (14:36)
Source Files
02 Summarize fundamental security concepts
02 01 Confidentiality, Integrity, and Availability (CIA) (24:04)
02 02 Non-repudiation (2:24)
02.03 Authentication, Authorization, and Accounting (AAA) (5:34)
02.04 Gap analysis (6:29)
02.05 Zero Trust (5:05)
02.06 Physical security (6:16)
02.07 Deception and disruption technology (7:00)
Source Files
03 Explain the importance of change management processes and the impact to security
03.01 Business processes impacting security operation (12:04)
03.02 Technical implications (2:17)
03.03 Documentation (3:10)
Source Files
04 Explain the importance of using appropriate cryptographic solutions
04.01 Public key infrastructure (PKI) (6:25)
04.02 Encryption (8:09)
04.03 Tools (12:08)
04.04 Obfuscation (6:18)
04.05 Hashing and Salting (4:38)
04.06 Digital signatures (3:59)
04.07 Key stretching (3:00)
04.08 Blockchain (2:34)
04.09 Open public ledger (3:28)
Source Files
05 Compare and contrast common threat actors and motivations
05.01 Threat actors (6:28)
05.02 Attributes of actors (1:52)
05.03 Motivations (4:38)
Source Files
06 Explain common threat vectors and attack surfaces
06.01 Common Threat Vectors and Attack Surfaces (23:56)
Source Files
07 Explain various types of vulnerabilities
07.01 Explain various types of vulnerabilities (4:05)
Resources
08 Given a scenario, analyze indicators of malicious activity
08.01 Malware attacks (3:42)
08.02 Physical attacks (3:05)
08.03 Network attacks (3:35)
08.04 Application attacks(1) (4:56)
08.05 Cryptographic attacks(1) (3:07)
08.06 Password attacks (4:43)
08.07 Indicators (3:37)
Source Files
09 Explain the purpose of mitigation techniques used to secure the enterprise
09.01 Segmentation (3:51)
09.02 Access control (3:58)
09.03 Mitigation Methods (3:58)
09.04 Hardening techniques (4:12)
Source Files
10 Compare and contrast security implications of different architecture models
10.01 Shared Responsibility Matrix (4:01)
10.02 Hybrid considerations (3:24)
10.03 Third-party vendors (3:27)
10.04 Infrastructure as code (IaC) (4:22)
10.05 Serverless (3:47)
10.06 Microservices (3:58)
10.07 Network infrastructure (3:28)
10.09 IoT (4:34)
10.11 Real-time operating system (RTOS) (3:33)
10.12 Embedded systems (3:17)
10.13 High availability (3:56)
10.14 Architectural Considerations (2:44)
Source Files
11 Given a scenario, apply security principles to secure enterprise infrastructure
11.01 Infrastructure considerations (3:56)
11.02 Secure communication and access (4:55)
Resources
12 Compare and contrast concepts and strategies to protect data
12.01 Data types (3:50)
12.02 Data classifications (3:35)
12.03 General data considerations (2:49)
12.04 Methods to secure data (3:27)
Source Files
13 Explain the importance of resilience and recovery in security architecture
13.01 High availability (4:11)
13.03 Platform diversity (4:00)
13.02 Site considerations (3:30)
13.04 Capacity planning (3:09)
13.05 Testing (3:52)
13.06 Backups (3:30)
13.07 Power (2:43)
Resources
14 Given a scenario, apply common security techniques to computing resources
14.01 Secure baselines (3:09)
14.02 Hardening targets (3:25)
14.03 Wireless devices (2:30)
14.04 Mobile solutions (3:34)
14.05 Wireless security settings (3:15)
14.06 Application security (2:23)
14.07 Sandboxing (2:14)
14.08 Monitoring (2:19)
Resources
15 Explain the security implications
15.01 Security implications of proper hardware, software, and data asset managem (2:54)
Resources
16 Explain various activities associated with vulnerability management
16.01 Identification methods (2:52)
16.02 Analysis (3:32)
16.03 Vulnerability response and remediation (3:31)
16.04 Validation of remediation (2:13)
16.05 Reporting (3:02)
Resources
17 Explain security alerting and monitoring concepts and tools
17.01 Monitoring computing resources (3:25)
17.02 Activities (2:39)
17.03 Tools (6:01)
Resources
18 Given a scenario, modify enterprise capabilities to enhance security
18.01 Enterprise capabilities to enhance security (5:22)
19 Given a scenario, implement and maintain identity and access management
19.01 Provisioning and de-provisioning user accounts (2:00)
19.02 Permission assignments and implications (2:06)
19.03 Identity proofing (2:33)
19.04 Federation (3:09)
19.05 Single sign-on (SSO) (2:59)
19.06 Interoperability (2:57)
19.07 Attestation (2:49)
19.08 Access controls (3:06)
19.09 Multifactor authentication (2:51)
19.10 Password concepts (3:00)
19.11 Privileged access management tools (3:42)
Test Your Knowledge
Practice Exam
20 Explain the importance of automation and orchestration
20.01 Automation and Orchestration (4:02)
21 Explain appropriate incident response activities
21.01 Incident Response (4:15)
22 Given a scenario, use data sources to support an investigation
22.01 Data Sources to Support an Investigation (5:14)
23 Summarize elements of effective security governance
23.01 Effective Security Governance Guidelines (4:17)
23.02 Policies (3:11)
23.03 Standards (2:41)
23.04 Procedures (3:16)
23.05 External considerations (4:10)
23.06 Monitoring and revision (3:22)
23.07 Types of governance structures (3:36)
23.08 Roles and responsibilities for systems and data (3:12)
24 Explain elements of the risk management process
24.01 Elements of the Risk Management Process (4:22)
25 Third-party risk assessment and management
25.01 Third-party Risk Assessment and Management (3:01)
26 Summarize elements of effective security compliance
26.01 Elements of effective security compliance (3:18)
27 Explain types and purposes of audits and assessments
27.01 Types and purposes of audits and assessments (2:56)
28 Given a scenario, implement security awareness practices
28.01 implement security awareness practices (3:23)
14.03 Wireless devices
Lesson content locked
If you're already enrolled,
you'll need to login
.
Enroll in Course to Unlock