![SY0-701: CompTIA Security+ Training Course](/design/img/courses/10649.jpg)
SY0-701: CompTIA Security+ Certification Video Training Course
The complete solution to prepare for for your exam with SY0-701: CompTIA Security+ certification video training course. The SY0-701: CompTIA Security+ certification video training course contains a complete set of videos that will provide you with thorough knowledge to understand the key concepts. Top notch prep including CompTIA SY0-701 exam dumps, study guide & practice test questions and answers.
SY0-701: CompTIA Security+ Certification Video Training Course Exam Curriculum
Chapter 0 - About Security+
-
1. Introduction to the CompTIA Security+ (SY0-701) Exam Prep Course
-
2. About the CompTIA Security+ (SY0-701) Exam
-
3. How to Take Your CompTIA Security+ (SY0-701) Exam
Chapter 1 - Risk Management
-
1. Defining Business Risk
-
2. Threat Actors, Part 1
-
3. Threat Actors, Part 2
-
4. Threat Intelligence
-
5. Risk Management Concepts
-
6. Security Controls
-
7. Risk Assessments and Treatments
-
8. Quantitative Risk Assessments
-
9. Qualitative Risk Assessments
-
10. Security and the Information Life Cycle
-
11. Data Destruction
-
12. Chapter 1 Exam Question Review
-
13. Wiping Disks with the dd Command Lab
Chapter 2 - Foundations of Cryptography
-
1. Cryptography Basics
-
2. Hashing
-
3. Cryptographic Attacks
-
4. Password Cracking
-
5. Password Cracking Demo
-
6. Chapter 2 Exam Question Review
-
7. SSH Public Key Authentication Lab
Chapter 3 - Physical Security
-
1. Physical Security
-
2. Keylogger Demo
-
3. Environmental Controls
-
4. Chapter 3 Exam Question Review
-
5. Physical Security Lab
Chapter 4 - Identity and Account
-
1. Identification, Authentication, and Authorization
-
2. Enabling Multifactor Authentication
-
3. Authorization
-
4. Accounting
-
5. Authentication Methods
-
6. Access Control Schemes
-
7. Account Management
-
8. Network Authentication
-
9. Identity Management Systems
-
10. Chapter 4 Exam Question Review
-
11. Creating Linux Users and Groups Lab
Chapter 5 - Tools of the Trade
-
1. Touring the CLI
-
2. Shells
-
3. The Windows Command Line
-
4. Microsoft PowerShell
-
5. Linux Shells
-
6. Network Scanners
-
7. Network Scanning with Nmap
-
8. Network Protocol Analyzers
-
9. Using Wireshark to Analyze Network Traffic
-
10. Using tcpdump to Analyze Network Traffic
-
11. Log Files
-
12. Centralized Logging
-
13. Cybersecurity Benchmark Tools
-
14. Configuring Linux Log Forwarding
-
15. Chapter 5 Exam Question Review
-
16. Linux Shell Script Lab
-
17. Nmap Lab
Chapter 6 - Securing Individual Systems
-
1. Malware
-
2. Weak Configurations
-
3. Common Attacks
-
4. Overflow Attacks
-
5. Password Attacks
-
6. Bots and Botnets
-
7. Disk RAID Levels
-
8. Securing Hardware
-
9. Securing Endpoints
-
10. Securing Data with Encryption
-
11. Chapter 6 Exam Question Review
-
12. Linux Software RAID Lab
-
13. Secure Enclave Lab in macOS
Chapter 7 - Securing The Basic LAN
-
1. Data Protection
-
2. Cryptographic Methods
-
3. Symmetric Cryptosystems
-
4. Symmetric Block Modes
-
5. Asymmetric Cryptosystems
-
6. Understanding Digital Certificates
-
7. Trust Models
-
8. Public Key Infrastructure
-
9. Certificate Types
-
10. Touring Certificates
-
11. Network Architecture Planning
-
12. The OSI Model
-
13. ARP Cache Poisoning
-
14. Other Layer 2 Attacks
-
15. Network Planning
-
16. Zero Trust Network Access (ZTNA) 2.0
-
17. Load Balancing
-
18. Securing Network Access
-
19. Honeypots
-
20. Static and Dynamic Code Analysis
-
21. Firewalls
-
22. Proxy Servers
-
23. Web Filtering
-
24. Network and Port Address Translation
-
25. IP Security (IPsec)
-
26. SD-WAN and SASE
-
27. Virtual Private Networks (VPNs)
-
28. Intrusion Detection and Prevention Systems (IDS/IPS)
-
29. Chapter 7 Exam Question Review
-
30. Linux Snort IDS Lab
Chapter 8 - Securing Wireless LANs
-
1. Wi-Fi Encryption Standards
-
2. RFID, NFC, and Bluetooth
-
3. Wi-Fi Coverage and Performance
-
4. Wi-Fi Discovery and Attacks
-
5. Cracking WPA2
-
6. Wi-Fi Hardening
-
7. Chapter 8 Exam Question Review
-
8. WPA2 Cracking Lab
Chapter 9 - Securing Virtual and Cloud Environments
-
1. Defending a Public Server
-
2. Common Attacks and Mitigations
-
3. DDoS Attacks in the Real World
-
4. Containers and Software-Defined Networking
-
5. Hypervisors and Virtual Machines
-
6. Cloud Deployment Models
-
7. Cloud Service Models
-
8. Securing the Cloud
-
9. Chapter 9 Exam Question Review
-
10. Docker Container Lab
Chapter 10 - Securing Dedicated and Mobile Systems
-
1. Industrial Control System (ICS)
-
2. Internet of Things (IoT) Devices
-
3. Connecting to Dedicated and Mobile Systems
-
4. Security Constraints for Dedicated Systems
-
5. Mobile Device Deployment and Hardening
-
6. Chapter 10 Exam Question Review
-
7. Smartphone Hardening Lab
-
8. Embedded Systems
Chapter 11 - Secure Protocols and Applications
-
1. FTP Packet Capture
-
2. Secure Web and E-mail
-
3. Request Forgery Attacks
-
4. Cross-Site Scripting Attacks
-
5. DNS Security
-
6. Web Application Security
-
7. OWASP Top 10
-
8. Web App Vulnerability Scanning
-
9. Chapter 11 Exam Question Review
-
10. OWASP ZAP Web App Scan Lab
Chapter 12 - Testing Infrastructure
-
1. Testing Infrastructure Overview
-
2. Social Engineering Attacks
-
3. Vulnerability Assessments
-
4. Penetration Testing
-
5. The Metasploit Framework
-
6. Chapter 12 Exam Question Review
Chapter 13 - Business Security Impact
-
1. Introduction to Business Security
-
2. Business Impact Analysis
-
3. Data Types and Roles
-
4. Personnel Risk and Policies
-
5. Attestation
-
6. Internal Audits and Assessments
-
7. External Audits and Assessments
-
8. Third-Party Risk Management
-
9. Agreement Types
-
10. Change Management
-
11. Technical Change Management
-
12. What Is Automation and Orchestration?
-
13. Benefits of Automation and Orchestration
-
14. Use Cases of Automation and Orchestration
-
15. Other Considerations of Automation and Orchestration
-
16. Putting It All Together
-
17. Exploring the NIST Frameworks
Chapter 14 - Dealing with Incidents
-
1. Incident Response Overview
-
2. Incident Response Plans (IRPs)
-
3. IRP Testing
-
4. Threat Analysis and Mitigating Actions
-
5. Digital Forensics
-
6. Business Continuity and Alternate Sites
-
7. Data Backup
-
8. Chapter 14 Exam Question Review
-
9. Autopsy Forensic Browser Lab
About SY0-701: CompTIA Security+ Certification Video Training Course
SY0-701: CompTIA Security+ certification video training course by prepaway along with practice test questions and answers, study guide and exam dumps provides the ultimate training package to help you pass.
Prepaway's SY0-701: CompTIA Security+ video training course for passing certification exams is the only solution which you need.
Pass CompTIA SY0-701 Exam in First Attempt Guaranteed!
Get 100% Latest Exam Questions, Accurate & Verified Answers As Seen in the Actual Exam!
30 Days Free Updates, Instant Download!
![SY0-701 Premium Bundle](/design/img/content/popup/premium-training-study/premium-training-study_1x.png)
SY0-701 Premium Bundle
- Premium File 546 Questions & Answers. Last update: Jan 12, 2025
- Training Course 167 Video Lectures
- Study Guide 1003 Pages
Free SY0-701 Exam Questions & CompTIA SY0-701 Dumps | ||
---|---|---|
Comptia.pass4sure.sy0-701.v2024-11-23.by.lewis.7q.ete |
Views: 0
Downloads: 866
|
Size: 13.03 KB
|
Student Feedback
Can View Online Video Courses
Please fill out your email address below in order to view Online Courses.
Registration is Free and Easy, You Simply need to provide an email address.
- Trusted By 1.2M IT Certification Candidates Every Month
- Hundreds Hours of Videos
- Instant download After Registration
A confirmation link will be sent to this email address to verify your login.
Please Log In to view Online Course
Registration is free and easy - just provide your E-mail address.
Click Here to Register