Curriculum For This Course
Video tutorials list
-
Overview of Security
Video Name Time 1. Overview of Security 02:55 2. CIA Triad 03:54 3. AAA of Security 03:05 4. Security Threats 02:57 5. Mitigating Threats 02:28 6. Hackers 04:53 7. Threat Actors 03:12 -
Malware
Video Name Time 1. Malware 00:39 2. Viruses 06:21 3. Worms 02:09 4. Trojans 02:48 5. Demo: Viruses and Trojans 06:16 6. Ransomware 02:30 7. Spyware 02:39 8. Rootkits 03:29 9. Spam 02:56 10. Summary of Malware 02:02 -
Malware Infections
Video Name Time 1. Malware Infections 04:12 2. Common Delivery Methods 03:23 3. Botnets and Zombies 03:30 4. Active Interception and Privilege Escalation 02:28 5. Demo: Privilege Escalation 05:41 6. Backdoors and Logic Bombs 03:48 7. Symptoms of Infection 04:10 8. Removing Malware 05:01 9. Preventing Malware 05:56 -
Security Applications and Devices
Video Name Time 1. Security Applications and Devices 00:33 2. Software Firewalls 04:16 3. Demo: Software Firewalls 06:44 4. IDS 05:03 5. Pop-up Blockers 03:09 6. Data Loss Prevention (DLP) 03:43 7. Securing the BIOS 03:56 8. Securing Storage Devices 03:26 9. Disk Encryption 04:51 -
Mobile Device Security
Video Name Time 1. Mobile Device Security 01:14 2. Securing Wireless Devices 01:30 3. Mobile Malware 06:19 4. SIM Cloning & ID Theft 04:00 5. Bluetooth Attacks 02:08 6. Mobile Device Theft 03:10 7. Security of Apps 05:06 8. BYOD 04:56 9. Hardening Mobile Devices 03:51 -
Hardening
Video Name Time 1. Hardening 01:47 2. Unnecessary Applications 03:10 3. Restricting Applications 02:56 4. Demo: Unnecessary Services 05:35 5. Trusted Operating System 01:57 6. Updates and Patches 03:26 7. Patch Management 03:49 8. Group Policies 02:33 9. Demo: Group Policies 04:06 10. File Systems and Hard Drives 03:18 -
Virtualization
Video Name Time 1. Virtualization 02:07 2. Hypervisors 02:37 3. Demo: How to create a VM 04:39 4. Threats to VMs 03:43 5. Securing VMs 03:47 6. Demo: Securing VMs 04:41 -
Application Security
Video Name Time 1. Application Security 01:43 2. Web Browser Security 06:39 3. Web Browser Concerns 03:19 4. Demo: Web Browser Configuration 05:20 5. Securing Applications 04:49 -
Secure Software Development
Video Name Time 1. Software Development 08:34 2. SDLC Principles 06:22 3. Testing Methods 06:59 4. Software Vulnerabilities and Exploits 02:28 5. Buffer Overflows 06:15 6. Demo: Buffer Overflow Attack 06:25 7. XSS and XSRF 03:07 8. SQL Injection 06:25 9. Demo: SQL Injection 07:13 -
Network Design
Video Name Time 1. Network Security 00:44 2. The OSI Model 06:00 3. Switches 03:32 4. Routers 02:27 5. Network Zones 03:26 6. Network Access Control 02:40 7. VLANs 01:30 8. Subnetting 01:51 9. Network Address Translation 02:26 10. Telephony 05:58 -
Perimeter Security
Video Name Time 1. Perimeter Security 00:46 2. Firewalls 08:01 3. Demo: SOHO Firewall 04:04 4. Proxy Servers 04:12 5. Honeypots and Honeynets 01:22 6. Data Loss Prevention 01:35 7. NIDS and NIPS 04:11 8. Unified Threat Management 01:52 -
Cloud Security
Video Name Time 1. Cloud Computing 03:29 2. Cloud Types 02:51 3. As a Service 07:04 4. Cloud Security 02:25 5. Defending Servers 04:32 -
Network Attacks
Video Name Time 1. Network Attacks 00:38 2. Ports and Protocols 00:54 3. Memorization of Ports 11:30 4. Unnecessary Ports 03:21 5. Denial of Service 07:56 6. DDoS 01:36 7. Stopping a DDoS 02:27 8. Spoofing 01:16 9. Hijacking 03:45 10. Replay Attack 01:27 11. Demo: Null Sessions 02:24 12. Transitive Attacks 01:24 13. DNS Attacks 04:33 14. ARP Poisoning 01:30 -
Securing Networks
Video Name Time 1. Securing Networks 00:49 2. Securing Network Devices 06:43 3. Securing Network Media 08:48 4. Securing WiFi Devices 04:22 5. Wireless Encryption 05:30 6. Wireless Access Points 06:11 7. Wireless Attacks 04:15 8. Demo: Wireless Attack 06:58 9. Other Wireless Technologies 06:02 -
Physical Security
Video Name Time 1. Physical Security 01:30 2. Surveillance 02:51 3. Door Locks 03:47 4. Demo: Lock Picking 01:36 5. Biometric Readers 04:15 -
Facilities Security
Video Name Time 1. Facilities Security 00:36 2. Fire Suppression 06:21 3. HVAC 02:23 4. Shielding 02:34 5. Vehicles 02:03 -
Authentication
Video Name Time 1. Authentication 05:53 2. Authentication Models 05:17 3. 802.1x 03:44 4. LDAP and Kerberos 02:26 5. Remote Desktop Services 01:51 6. Remote Access Service 02:03 7. VPN 03:02 8. RADIUS vs TACACS+ 02:18 9. Authentication Summary 02:04 -
Access Control
Video Name Time 1. Access Control 00:50 2. Access Control Models 08:14 3. Best Practices 05:44 4. Users and Groups 09:12 5. Permissions 03:41 6. Usernames and Passwords 02:36 7. Demo: Policies 04:34 8. User Account Control 01:53 -
Risk Assessments
Video Name Time 1. Risk Assessments 08:33 2. Qualitative Risk 04:06 3. Quantitative Risk 05:27 4. Methodologies 02:49 5. Security Controls 06:49 6. Vulnerability Management 07:50 7. Penetration Testing 04:26 8. OVAL 01:34 9. Vulnerability Assessments 06:52 10. Demo: Nmap Scanning 08:50 11. Demo: Vulnerability Scanning 09:33 12. Password Analysis 05:54 13. Demo: Password Cracking 02:36 -
Monitoring and Auditing
Video Name Time 1. Monitoring Types 02:54 2. Performance Baselining 04:35 3. Protocol Analyzers 02:58 4. SNMP 03:40 5. Demo: Analytical Tools 04:27 6. Auditing 01:54 7. Demo: Auditing Files 03:53 8. Logging 03:39 9. Log Files 05:14 10. SIEM 02:54 -
Cryptography
Video Name Time 1. Cryptography 04:56 2. Symmetric vs Asymmetric 06:12 3. Symmetric Algorithms 04:56 4. Public Key Cryptography 03:09 5. Asymmetric Algorithms 03:44 6. Pretty Good Privacy 01:46 7. Key Management 02:11 8. One-Time Pad 04:18 9. Hashing 08:27 10. Demo: Hashing 03:04 11. Hashing Attacks 03:15 12. Increasing Hash Security 01:26 -
Public Key Infrastructure
Video Name Time 1. Public Key Infrastructure 03:53 2. Digital Certificates 06:42 3. Demo: Certificates 03:31 4. Certificate Authorities 04:12 5. Web of Trust 02:35 -
Security Protocols
Video Name Time 1. Security Protocols 00:21 2. S/MIME 01:29 3. SSL and TLS 05:48 4. SSH 02:28 5. VPN Protocols 06:37 6. Demo: Setting up a VPN 01:37 -
Planning for the Worst
Video Name Time 1. Planning for the Worst 02:09 2. Redundant Power 03:08 3. Backup Power 03:06 4. Data Redundancy 04:39 5. Demo: RAIDs 03:35 6. Network Redundancy 02:04 7. Server Redundancy 01:42 8. Redundant Sites 02:20 9. Data Backup 02:54 10. Tape Rotation 03:52 11. Disaster Recovery Plan 05:38 -
Social Engineering
Video Name Time 1. Social Engineering 00:52 2. Demo: Pretexting 04:14 3. Insider Threat 02:10 4. Phishing 01:13 5. More Social Engineering 04:00 6. User Education 04:44 -
Policies and Procedures
Video Name Time 1. Policies and Procedures 05:53 2. Data Classifications 06:42 3. PII and PHI 06:19 4. Security Policies 10:19 5. User Education 04:02 6. Vendor Relationships 07:52 7. Disposal Policies 05:04 8. Incident Response Procedures 04:36 9. Data Collection Procedures 03:11 10. Demo: Disk Imaging 06:56 11. IT Security Frameworks 03:18 -
Conclusion
Video Name Time 1. Exam Tricks 04:09
SY0-501: CompTIA Security+ Certification Training Video Course Intro
Certbolt provides top-notch exam prep SY0-501: CompTIA Security+ certification training video course to prepare for the exam. Additionally, we have CompTIA Security+ SY0-501 exam dumps & practice test questions and answers to prepare and study. pass your next exam confidently with our SY0-501: CompTIA Security+ certification video training course which has been written by CompTIA experts.
This CompTIA SY0-501 video course makes one prepared to take the exam by imparting all the knowledge and skills required. By providing highly informative lectures on the tested topics and extra concepts, it helps candidates to understand all the ins and outs of the security field and get eligible for the Security+ certification.
Description
This course of video lessons for the CompTIA SY0-501 test includes 27 modules with a total duration of almost 15 hours. It allows the applicants to get a general overview of the security sphere as well as delve deeper in the detailed aspects. These include malware, securing devices along with apps, virtualization, network design and protection, access and authentication, PKI (Public Key Infrastructure), and social engineering, among the other topics.
By completing this course, you will gain skills covered by the syllabus of SY0-501 test. They relate to the areas of architecture and design, different vulnerabilities and threats, implementation of security tools and concepts, incident response, common operations, risk management, compliance, and governance.
Knowledge and Skills Students Develop
SY0-501 video course contains 222 lectures that start with basic security areas and features such as various types of threats, CIA Triad, hackers, etc. Lots of attention is paid to malware (viruses, trojans, worms, and others) as well as symptoms of malware infections and removal techniques. One more important part of the content covers security principles of applications, facilities, mobile devices, cloud, networks, and safety-based software development.
Other topics involved in this SY0-501 course are as follows: hardening (patch management, group policies, trusted OS, etc.), virtualization, perimeter security (NIDS and NIPS, data loss prevention, proxy servers, firewalls, and others), an overview of network attacks, physical security, authentication, access control, security protocols, and cryptography. In addition, the concepts of monitoring, auditing, performing risk assessments, planning for the worst (network and server redundancy, data backup, RAIDs, etc.), procedures, policies, and social engineering. In the final section of the course, you will get familiar with some tricks that will be helpful during SY0-501 exam.
Requirements for This Course
To complete the course successfully, you should already possess fundamental IT knowledge and understand security basics. Some hands-on experience is also recommended. In addition, candidates should make the most of the lectures by watching videos with no distractions and solidifying the acquired information with the help of practical exercises and additional study materials.
Exam Design
The Security+ SY0-501 exam consists of 90 questions presented in the formats of MCQ and performance-based tasks that require practical proficiency. You will be given 90 minutes to complete the test with an aim to gain 750 marks on a scale of 100-900. The exam can be taken in the testing centers or online in English, Portuguese, Simplified Chinese, or Japanese. Also, there is a registration fee of $349.
Target Audience
This course is ideal for the following individuals:
- Candidates preparing to pass SY0-501 exam
- Security specialists willing to verify their competence with the CompTIA Security+ certification
- Professionals with the CompTIA Network+ certificate aiming to shift to the security sphere
- Individuals with about two years of working experience in cybersecurity who want to upgrade to land a new job or get promoted
- Those who need to broaden their knowledge base and skill set to become eligible for the roles such as security administrator, systems administrator, IT auditor, and such.
Conclusion
This video course for the CompTIA SY0-501 exam makes one ready to tackle all the questions arising in the test. Once you complete it, you’ll be knowledgeable in the topics required and will be able to implement new skills in the workplace. Moreover, the video format of the lectures boosts information retention and makes it easier to understand even the complex cybersecurity concepts.
Job Opportunities
After taking this course and earning the CompTIA Security+ certificate, you will be able to apply for a wide scope of positions that include network engineer, security administrator, security analyst, software developer, and many others. In addition, Security+ certified specialists can expect improved wages. Thus, according to PayScale, average annual compensation for such professionals is about $76k.
Certbolt's total training solution includes SY0-501: CompTIA Security+ certification video training course, CompTIA Security+ SY0-501 practice test questions and answers & exam dumps which provide the complete exam prep resource and provide you with practice skills to pass the exam. SY0-501: CompTIA Security+ certification video training course provides a structured approach easy to understand, structured approach which is divided into sections in order to study in shortest time possible.
SY0-501 Exam Course Reviews
* The most recent comments are at the top Add CommentExcellent video
Add Comment