
10 episodios
1. Risk Management

1. Risk Management
This episode introduces you to the certification exam and discusses the three goals of security. You'll also identify types of risk and learn how to bring them under control. Moving along, you'll become familiar with the policies, training, and framework related to security.
2. Cryptography

2. Cryptography
In this episode, you'll go through the basics of Cryptography. You'll find out how to encrypt and decrypt data with the same and different keys and get to grips with the popular Diffie-Hellman algorithm and PG/GPG methods. You'll also work with certificates, steganography, and get a demo on how to protect encrypted information.
3. Identity and Access Management

3. Identity and Access Management
This episode will show you how to protect your identity online. You'll learn authorization concepts, strengthen your passwords, add permissions to your machines and operating systems, and set up a strong user account management.
4. Tools of the Trade

4. Tools of the Trade
You'll become familiar with the tools that play an important role in securing online devices.
5. Securing Individual Systems

5. Securing Individual Systems
This episode lists out the attacks that prevent our individual systems from functioning correctly. Moving along, you'll find out amazing techniques to keep these attacks away from the systems.
6. The Basic Lan

6. The Basic Lan
This episode will get you started with LAN security. You'll figure out network topologies, zones, and firewalls, along with proxy servers, honeypots, and VPN.
7. Beyond the Basic LAN

7. Beyond the Basic LAN
In the last episode, you have learned the basics of LAN security. This episode will help you to grasp advanced concepts of securing the LAN. You'll deal with WEP, WPA, and WPS wireless security attacks and explore virtualization technologies and wireless hardening. You'll also learn techniques to remain secure in a non-secure, open-network environment, like a coffee shop.
8. Secure Protocols

8. Secure Protocols
You'll find out what role does TLS and internet service hardening plays in protocol security. You'll also take a look at the methods that are used for securing the deployment code.
9. Testing Your Infrastructure

9. Testing Your Infrastructure
This episode will make you familiar with the vulnerability scanning tools that help in spotting the weaknesses in computers and online devices. You'll also explore social engineering attacks and find out how systems are exploited and how the attacks can be prevented.
10. Dealing with Incidents

10. Dealing with Incidents
In this episode, you'll learn the steps involved in incident response. You'll collect and preserve data when incidents happen, create a contingency plan, and find out the importance of taking backups.
CompTIA Security+ Certification SY0-501: The Total Course
20191 temporada
Creadores y reparto
- Reparto
- Estudio
Comentarios
- 0%
- 0%
- 0%
- 0%
- 0%
Advertencias de contenido
Idiomas de audio
Subtítulos
Al hacer un pedido o ver contenido, aceptas nuestros Términos. Vendido por Amazon por Amazon.com Services LLC.